4.4
CVE-2019-1880
- EPSS 0.03%
- Veröffentlicht 05.06.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 04:37:36
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the BIOS upgrade utility of Cisco Unified Computing System (UCS) C-Series Rack Servers could allow an authenticated, local attacker to install compromised BIOS firmware on an affected device. The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS upgrade utility with a specific set of options. A successful exploit could allow the attacker to bypass the firmware signature-verification process and install compromised BIOS firmware on an affected device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Unified Computing System Server Firmware Version < 4.0\(2g\)
Cisco ≫ Unified Computing System Server Firmware Version < 3.0\(4l\)
Cisco ≫ Unified Computing System Server Firmware Version >= 4.0 < 4.0\(2g\)
Cisco ≫ Unified Computing System Server Firmware Version < 4.0\(4c\)
Cisco ≫ Unified Computing System Server Firmware Version < 3.0\(4l\)
Cisco ≫ Unified Computing System Server Firmware Version >= 4.0 < 4.0\(2g\)
Cisco ≫ Unified Computing System Server Firmware Version < 4.0\(4c\)
Cisco ≫ Unified Computing System Server Firmware Version < 3.0\(4l\)
Cisco ≫ Unified Computing System Server Firmware Version >= 4.0 < 4.0\(2g\)
Cisco ≫ Unified Computing System Server Firmware Version < 4.0\(4c\)
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.04 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4.4 | 0.8 | 3.6 |
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:N/I:P/A:N
|
psirt@cisco.com | 4.4 | 0.8 | 3.6 |
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
|
CWE-345 Insufficient Verification of Data Authenticity
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.