cisco unified_computing_system 输入验证不恰当
CVE编号
CVE-2021-34736利用情况
暂无补丁情况
N/A披露时间
2021-10-21漏洞描述
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to cause the web-based management interface to unexpectedly restart. The vulnerability is due to insufficient input validation on the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause the interface to restart, resulting in a denial of service (DoS) condition.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | unified_computing_system | * | Up to (excluding) 4.1\(2g\) | |||||
运行在以下环境 | |||||||||
应用 | cisco | unified_computing_system | * | Up to (excluding) 4.1\(3e\) | |||||
运行在以下环境 | |||||||||
应用 | cisco | unified_computing_system | * | From (including) 4.2 | Up to (excluding) 4.2\(1b\) | ||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c125_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c220_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c220_m4 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c220_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c225_m6 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c22_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c240_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c240_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c240_sd_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c245_m6 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c24_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c260_m2 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c3160 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c3260 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c4200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c420_m3 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c460_m2 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c460_m4 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c480_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c480_ml_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_c890_m5 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | ucs_s3260 | - | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
CWE-ID | 漏洞类型 |
CWE-20 | 输入验证不恰当 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论