4.4
CVE-2019-1880
- EPSS 0.03%
- Published 05.06.2019 17:29:00
- Last modified 21.11.2024 04:37:36
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Unified Computing System Server Firmware Version < 4.0\(2g\)
Cisco ≫ Unified Computing System Server Firmware Version < 3.0\(4l\)
Cisco ≫ Unified Computing System Server Firmware Version >= 4.0 < 4.0\(2g\)
Cisco ≫ Unified Computing System Server Firmware Version < 4.0\(4c\)
Cisco ≫ Unified Computing System Server Firmware Version < 3.0\(4l\)
Cisco ≫ Unified Computing System Server Firmware Version >= 4.0 < 4.0\(2g\)
Cisco ≫ Unified Computing System Server Firmware Version < 4.0\(4c\)
Cisco ≫ Unified Computing System Server Firmware Version < 3.0\(4l\)
Cisco ≫ Unified Computing System Server Firmware Version >= 4.0 < 4.0\(2g\)
Cisco ≫ Unified Computing System Server Firmware Version < 4.0\(4c\)
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.04 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.4 | 0.8 | 3.6 |
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:N/I:P/A:N
|
psirt@cisco.com | 4.4 | 0.8 | 3.6 |
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
|
CWE-345 Insufficient Verification of Data Authenticity
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.