CVE-2019-1667
21.02.2019, 19:29
A vulnerability in the Graphite interface of Cisco HyperFlex software could allow an authenticated, local attacker to write arbitrary data to the Graphite interface. The vulnerability is due to insufficient authorization controls. An attacker could exploit this vulnerability by connecting to the Graphite service and sending arbitrary data. A successful exploit could allow the attacker to write arbitrary data to Graphite, which could result in invalid statistics being presented in the interface. Versions prior to 3.5(2a) are affected.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | hyperflex_hx_data_platform | 2.6\(1a\) |
cisco | hyperflex_hx_data_platform | 2.6\(1b\) |
cisco | hyperflex_hx_data_platform | 2.6\(1d\) |
cisco | hyperflex_hx_data_platform | 2.6\(1e\) |
cisco | hyperflex_hx_data_platform | 3.0\(1a\) |
cisco | hyperflex_hx_data_platform | 3.0\(1b\) |
cisco | hyperflex_hx_data_platform | 3.0\(1c\) |
cisco | hyperflex_hx_data_platform | 3.0\(1d\) |
cisco | hyperflex_hx_data_platform | 3.0\(1e\) |
cisco | hyperflex_hx_data_platform | 3.0\(1h\) |
cisco | hyperflex_hx_data_platform | 3.0\(1i\) |
cisco | hyperflex_hx_data_platform | 3.5\(1a\) |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-345 - Insufficient Verification of Data AuthenticityThe software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.