The vulnerability is due to improper authorization checks on API endpoints. An attacker could exploit this vulnerability by sending malicious requests to an API endpoint. An exploit could allow the attacker to download files from or modify limited configuration options on the affected system.There are no workarounds that address this vulnerability.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-18693 | A vulnerability in the API endpoints of Cisco Integrated Management Controller could allow an authenticated, remote attacker to bypass authorization and take actions on a vulnerable system without authorization. The vulnerability is due to improper authorization checks on API endpoints. An attacker could exploit this vulnerability by sending malicious requests to an API endpoint. An exploit could allow the attacker to download files from or modify limited configuration options on the affected system.There are no workarounds that address this vulnerability. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco unified Computing System |
|
| CPEs | cpe:2.3:a:cisco:unified_computing_system:3.2\(1d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(2b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(2c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(2d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(2e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(2f\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3g\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3h\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3i\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3j\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3k\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3l\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3n\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3o\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:3.2\(3p\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(1d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(2a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(2b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(2d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(2e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(4a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(4b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(4c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(4d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(4e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(4f\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(4g\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(4h\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.0\(4i\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(1a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(1b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(1d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(1e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(2a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(2b\):*:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco
Cisco unified Computing System |
|
| Metrics |
ssvc
|
Mon, 18 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the API endpoints of Cisco Integrated Management Controller could allow an authenticated, remote attacker to bypass authorization and take actions on a vulnerable system without authorization. The vulnerability is due to improper authorization checks on API endpoints. An attacker could exploit this vulnerability by sending malicious requests to an API endpoint. An exploit could allow the attacker to download files from or modify limited configuration options on the affected system.There are no workarounds that address this vulnerability. | |
| Title | Cisco Integrated Management Controller Software Authorization Bypass Vulnerability | |
| Weaknesses | CWE-269 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-18T19:49:33.809Z
Reserved: 2020-09-24T00:00:00.000Z
Link: CVE-2020-26063
Updated: 2024-11-18T19:47:43.762Z
Status : Awaiting Analysis
Published: 2024-11-18T16:15:05.460
Modified: 2024-11-18T17:11:17.393
Link: CVE-2020-26063
No data.
OpenCVE Enrichment
No data.
EUVD