7.4

CVE-2019-12621

A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack. The vulnerability is due to insufficient key management. An attacker could exploit this vulnerability by obtaining a specific encryption key for the cluster. A successful exploit could allow the attacker to perform a man-in-the-middle attack against other nodes in the cluster.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoHyperflex Hx220c M5 Firmware Version3.0(1a)
   CiscoHyperflex Hx220c M5 Version-
CiscoHyperflex Hx220c M5 Firmware Version3.5(2a)
   CiscoHyperflex Hx220c M5 Version-
CiscoHyperflex Hx240c M5 Firmware Version3.0(1a)
   CiscoHyperflex Hx240c M5 Version-
CiscoHyperflex Hx240c M5 Firmware Version3.5(2a)
   CiscoHyperflex Hx240c M5 Version-
CiscoHyperflex Hx220c Af M5 Firmware Version3.0(1a)
   CiscoHyperflex Hx220c Af M5 Version-
CiscoHyperflex Hx220c Af M5 Firmware Version3.5(2a)
   CiscoHyperflex Hx220c Af M5 Version-
CiscoHyperflex Hx240c Af M5 Firmware Version3.0(1a)
   CiscoHyperflex Hx240c Af M5 Version-
CiscoHyperflex Hx240c Af M5 Firmware Version3.5(2a)
   CiscoHyperflex Hx240c Af M5 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.198
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.4 2.2 5.2
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N
psirt@cisco.com 6.8 1.6 5.2
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.