A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to bypass authentication on the REST API. The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on an affected system.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 19 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-19T19:07:39.653Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1867
Updated: 2024-08-04T18:28:42.920Z
Status : Modified
Published: 2019-05-10T12:29:00.387
Modified: 2024-11-21T04:37:34.337
Link: CVE-2019-1867
No data.
OpenCVE Enrichment
No data.
Weaknesses