445
VMScore

CVE-2019-1666

Published: 21/02/2019 Updated: 05/10/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A vulnerability in the Graphite service of Cisco HyperFlex software could allow an unauthenticated, remote malicious user to retrieve data from the Graphite service. The vulnerability is due to insufficient authentication controls. An attacker could exploit this vulnerability by sending crafted requests to the Graphite service. A successful exploit could allow the malicious user to retrieve any statistics from the Graphite service. Versions before 3.5(2a) are affected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco hyperflex hx data platform 3.5\\(1a\\)

cisco hyperflex hx data platform 2.6\\(1a\\)

cisco hyperflex hx data platform 2.6\\(1d\\)

cisco hyperflex hx data platform 3.0\\(1d\\)

cisco hyperflex hx data platform 3.0\\(1h\\)

cisco hyperflex hx data platform 2.6\\(1e\\)

cisco hyperflex hx data platform 3.0\\(1a\\)

cisco hyperflex hx data platform 3.0\\(1b\\)

cisco hyperflex hx data platform 3.0\\(1c\\)

cisco hyperflex hx data platform 2.6\\(1b\\)

cisco hyperflex hx data platform 3.0\\(1e\\)

cisco hyperflex hx data platform 3.0\\(1i\\)

Vendor Advisories

A vulnerability in the Graphite service of Cisco HyperFlex software could allow an unauthenticated, remote attacker to retrieve data from the Graphite service The vulnerability is due to insufficient authentication controls An attacker could exploit this vulnerability by sending crafted requests to the Graphite service A successful exploit could ...

Github Repositories

Vulnerable rConfig Images Demo images for CVE-2019-16662 and CVE-2019-16663 Info This repository contains the setup to create two docker images running rConfig 392 Each image contains an /exploitpy to trigger the vulnerability For further info have a look at the corresponding blog post Run You can just pull the image from docker hub: docker run -it fab1ano/cve-2019-1666[