A vulnerability in the configuration import utility of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to have write access and upload arbitrary data to the filesystem. The vulnerability is due to a failure to delete temporarily uploaded files. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the affected device. An exploit could allow the attacker to fill up the filesystem or upload malicious scripts.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/108852 | Third Party Advisory VDB Entry | 
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-filewrite | Vendor Advisory | 
| http://www.securityfocus.com/bid/108852 | Third Party Advisory VDB Entry | 
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-filewrite | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 04:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/108852 - Third Party Advisory, VDB Entry | |
| References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-filewrite - Vendor Advisory | 
Information
                Published : 2019-06-20 03:15
Updated : 2024-11-21 04:36
NVD link : CVE-2019-1629
Mitre link : CVE-2019-1629
CVE.ORG link : CVE-2019-1629
JSON object : View
Products Affected
                cisco
- unified_computing_system
- integrated_management_controller
CWE
                
                    
                        
                        CWE-306
                        
            Missing Authentication for Critical Function
