A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote malicious user to perform a man-in-the-middle attack. The vulnerability is due to insufficient key management. An attacker could exploit this vulnerability by obtaining a specific encryption key for the cluster. A successful exploit could allow the malicious user to perform a man-in-the-middle attack against other nodes in the cluster.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco hyperflex_hx220c_m5_firmware 3.0\\(1a\\) |
||
cisco hyperflex_hx220c_m5_firmware 3.5\\(2a\\) |
||
cisco hyperflex_hx240c_m5_firmware 3.0\\(1a\\) |
||
cisco hyperflex_hx240c_m5_firmware 3.5\\(2a\\) |
||
cisco hyperflex_hx220c_af_m5_firmware 3.5\\(2a\\) |
||
cisco hyperflex_hx220c_af_m5_firmware 3.0\\(1a\\) |
||
cisco hyperflex_hx240c_af_m5_firmware 3.0\\(1a\\) |
||
cisco hyperflex_hx240c_af_m5_firmware 3.5\\(2a\\) |
||
cisco hyperflex_hx220c_edge_m5_firmware 3.0\\(1a\\) |
||
cisco hyperflex_hx220c_edge_m5_firmware 3.5\\(2a\\) |