A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability is known as an open redirect attack, which is used in phishing attacks to get users to visit malicious sites without their knowledge.

Project Subscriptions

Vendors Products
C125 M5 Subscribe
C125 M5 Firmware Subscribe
C220 M5 Subscribe
C220 M5 Firmware Subscribe
C220 M6 Subscribe
C220 M6 Firmware Subscribe
C225 M6 Subscribe
C225 M6 Firmware Subscribe
C240 M5 Subscribe
C240 M5 Firmware Subscribe
C240 M6 Subscribe
C240 M6 Firmware Subscribe
C245 M6 Subscribe
C245 M6 Firmware Subscribe
C480 M5 Subscribe
C480 M5 Firmware Subscribe
C480 Ml M5 Subscribe
C480 Ml M5 Firmware Subscribe
Encs 5100 Subscribe
Encs 5100 Firmware Subscribe
Encs 5400 Subscribe
Encs 5400 Firmware Subscribe
Integrated Management Controller Subscribe
Ucs-e1120d-m3 Subscribe
Ucs-e1120d-m3 Firmware Subscribe
Ucs-e140d Subscribe
Ucs-e140d Firmware Subscribe
Ucs-e140dp Subscribe
Ucs-e140dp Firmware Subscribe
Ucs-e140s Subscribe
Ucs-e140s-m1 Subscribe
Ucs-e140s-m1 Firmware Subscribe
Ucs-e140s-m2 Subscribe
Ucs-e140s-m2 Firmware Subscribe
Ucs-e140s Firmware Subscribe
Ucs-e160d Subscribe
Ucs-e160d Firmware Subscribe
Ucs-e160dp-m1 Subscribe
Ucs-e160dp-m1 Firmware Subscribe
Ucs-e160s-m3 Subscribe
Ucs-e160s-m3 Firmware Subscribe
Ucs-e180d-m2 Subscribe
Ucs-e180d-m2 Firmware Subscribe
Ucs-e180d-m3 Subscribe
Ucs-e180d-m3 Firmware Subscribe
Ucs Manager Subscribe
Ucs S3260 Subscribe
Ucs S3260 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-6864 A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability is known as an open redirect attack, which is used in phishing attacks to get users to visit malicious sites without their knowledge.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 09 Nov 2024 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-08T23:17:54.152Z

Reserved: 2020-11-13T00:00:00

Link: CVE-2021-1397

cve-icon Vulnrichment

Updated: 2024-08-03T16:11:16.928Z

cve-icon NVD

Status : Modified

Published: 2021-05-06T13:15:09.950

Modified: 2024-11-21T05:44:15.633

Link: CVE-2021-1397

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses