CVE-2020-26062
Vulnerability from cvelistv5
Published
2024-11-18 16:06
Modified
2024-11-18 18:46
Severity ?
EPSS score ?
0.05%
(0.23747)
Summary
A vulnerability in Cisco Integrated Management Controller could allow an unauthenticated, remote attacker to enumerate valid usernames within the vulnerable application.
The vulnerability is due to differences in authentication responses sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to the affected application. A successful exploit could allow the attacker to confirm the names of administrative user accounts for use in further attacks.There are no workarounds that address this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Unified Computing System (Managed) |
Version: 4.0(1a) Version: 3.2(3n) Version: 4.1(1a) Version: 4.1(1b) Version: 4.0(4h) Version: 4.1(1c) Version: 3.2(3k) Version: 3.2(2c) Version: 4.0(4e) Version: 4.0(4g) Version: 3.2(3i) Version: 4.0(2e) Version: 3.2(3g) Version: 4.0(4a) Version: 4.0(2d) Version: 3.2(2d) Version: 4.0(1b) Version: 4.0(4f) Version: 3.2(3h) Version: 3.2(2f) Version: 4.0(4c) Version: 3.2(3a) Version: 4.0(1c) Version: 3.2(3d) Version: 3.2(2b) Version: 4.0(4b) Version: 3.2(2e) Version: 4.0(2b) Version: 4.0(4d) Version: 3.2(1d) Version: 3.2(3e) Version: 3.2(3l) Version: 3.2(3b) Version: 4.0(2a) Version: 3.2(3j) Version: 4.0(1d) Version: 3.2(3o) Version: 4.0(4i) Version: 4.1(1d) Version: 4.1(2a) Version: 4.1(1e) Version: 3.2(3p) |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:cisco:unified_computing_system:4.0\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3n\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3k\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3g\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(2d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3h\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(1c\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(1d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3l\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3j\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(1d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3o\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4i\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1d\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.1\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1e\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3p\\):*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "unified_computing_system", vendor: "cisco", versions: [ { status: "affected", version: "4.0\\(1a\\)", }, { status: "affected", version: "3.2\\(3n\\)", }, { status: "affected", version: "4.1\\(1a\\)", }, { status: "affected", version: "4.1\\(1b\\)", }, { status: "affected", version: "4.0\\(4h\\)", }, { status: "affected", version: "4.1\\(1c\\)", }, { status: "affected", version: "3.2\\(3k\\)", }, { status: "affected", version: "3.2\\(2c\\)", }, { status: "affected", version: "4.0\\(4e\\)", }, { status: "affected", version: "4.0\\(4g\\)", }, { status: "affected", version: "3.2\\(3i\\)", }, { status: "affected", version: "4.0\\(2e\\)", }, { status: "affected", version: "3.2\\(3g\\)", }, { status: "affected", version: "4.0\\(4a\\)", }, { status: "affected", version: "4.0\\(2d\\)", }, { status: "affected", version: "3.2\\(2d\\)", }, { status: "affected", version: "4.0\\(1b\\)", }, { status: "affected", version: "4.0\\(4f\\)", }, { status: "affected", version: "3.2\\(3h\\)", }, { status: "affected", version: "3.2\\(2f\\)", }, { status: "affected", version: "4.0\\(4c\\)", }, { status: "affected", version: "3.2\\(3a\\)", }, { status: "affected", version: "4.0\\(1c\\)", }, { status: "affected", version: "3.2\\(3d\\)", }, { status: "affected", version: "3.2\\(2b\\)", }, { status: "affected", version: "4.0\\(4b\\)", }, { status: "affected", version: "3.2\\(2e\\)", }, { status: "affected", version: "4.0\\(2b\\)", }, { status: "affected", version: "4.0\\(4d\\)", }, { status: "affected", version: "3.2\\(1d\\)", }, { status: "affected", version: "3.2\\(3e\\)", }, { status: "affected", version: "3.2\\(3l\\)", }, { status: "affected", version: "3.2\\(3b\\)", }, { status: "affected", version: "4.0\\(2a\\)", }, { status: "affected", version: "3.2\\(3j\\)", }, { status: "affected", version: "4.0\\(1d\\)", }, { status: "affected", version: "3.2\\(3o\\)", }, { status: "affected", version: "4.0\\(4i\\)", }, { status: "affected", version: "4.1\\(1d\\)", }, { status: "affected", version: "4.1\\(2a\\)", }, { status: "affected", version: "4.1\\(1e\\)", }, { status: "affected", version: "3.2\\(3p\\)", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2020-26062", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-18T18:39:09.926743Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-18T18:46:04.617Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Cisco Unified Computing System (Managed)", vendor: "Cisco", versions: [ { status: "affected", version: "4.0(1a)", }, { status: "affected", version: "3.2(3n)", }, { status: "affected", version: "4.1(1a)", }, { status: "affected", version: "4.1(1b)", }, { status: "affected", version: "4.0(4h)", }, { status: "affected", version: "4.1(1c)", }, { status: "affected", version: "3.2(3k)", }, { status: "affected", version: "3.2(2c)", }, { status: "affected", version: "4.0(4e)", }, { status: "affected", version: "4.0(4g)", }, { status: "affected", version: "3.2(3i)", }, { status: "affected", version: "4.0(2e)", }, { status: "affected", version: "3.2(3g)", }, { status: "affected", version: "4.0(4a)", }, { status: "affected", version: "4.0(2d)", }, { status: "affected", version: "3.2(2d)", }, { status: "affected", version: "4.0(1b)", }, { status: "affected", version: "4.0(4f)", }, { status: "affected", version: "3.2(3h)", }, { status: "affected", version: "3.2(2f)", }, { status: "affected", version: "4.0(4c)", }, { status: "affected", version: "3.2(3a)", }, { status: "affected", version: "4.0(1c)", }, { status: "affected", version: "3.2(3d)", }, { status: "affected", version: "3.2(2b)", }, { status: "affected", version: "4.0(4b)", }, { status: "affected", version: "3.2(2e)", }, { status: "affected", version: "4.0(2b)", }, { status: "affected", version: "4.0(4d)", }, { status: "affected", version: "3.2(1d)", }, { status: "affected", version: "3.2(3e)", }, { status: "affected", version: "3.2(3l)", }, { status: "affected", version: "3.2(3b)", }, { status: "affected", version: "4.0(2a)", }, { status: "affected", version: "3.2(3j)", }, { status: "affected", version: "4.0(1d)", }, { status: "affected", version: "3.2(3o)", }, { status: "affected", version: "4.0(4i)", }, { status: "affected", version: "4.1(1d)", }, { status: "affected", version: "4.1(2a)", }, { status: "affected", version: "4.1(1e)", }, { status: "affected", version: "3.2(3p)", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in Cisco Integrated Management Controller could allow an unauthenticated, remote attacker to enumerate valid usernames within the vulnerable application.\r\nThe vulnerability is due to differences in authentication responses sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to the affected application. A successful exploit could allow the attacker to confirm the names of administrative user accounts for use in further attacks.There are no workarounds that address this vulnerability.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/RL:X/RC:X/E:X", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-203", description: "Observable Discrepancy", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-18T16:06:00.592Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-cimc-enum-CyheP3B7", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-enum-CyheP3B7", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD", }, { name: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-zWkppJxL", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-zWkppJxL", }, ], source: { advisory: "cisco-sa-cimc-enum-CyheP3B7", defects: [ "CSCvv07275", ], discovery: "EXTERNAL", }, title: "Cisco Integrated Management Controller Username Enumeration Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-26062", datePublished: "2024-11-18T16:06:00.592Z", dateReserved: "2020-09-24T00:00:00.000Z", dateUpdated: "2024-11-18T18:46:04.617Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2020-26062\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-11-18T16:15:05.170\",\"lastModified\":\"2024-11-18T17:11:17.393\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in Cisco Integrated Management Controller could allow an unauthenticated, remote attacker to enumerate valid usernames within the vulnerable application.\\r\\nThe vulnerability is due to differences in authentication responses sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to the affected application. A successful exploit could allow the attacker to confirm the names of administrative user accounts for use in further attacks.There are no workarounds that address this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en Cisco Integrated Management Controller podría permitir que un atacante remoto no autenticado enumere nombres de usuario válidos dentro de la aplicación vulnerable. La vulnerabilidad se debe a diferencias en las respuestas de autenticación enviadas desde la aplicación como parte de un intento de autenticación. Un atacante podría aprovechar esta vulnerabilidad enviando solicitudes de autenticación a la aplicación afectada. Una explotación exitosa podría permitir al atacante confirmar los nombres de las cuentas de usuario administrativas para usarlas en ataques posteriores. No existen workarounds que aborden esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-203\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-zWkppJxL\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-enum-CyheP3B7\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3\",\"source\":\"ykramarz@cisco.com\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-26062\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-18T18:39:09.926743Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(1a\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3n\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.1\\\\(1a\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.1\\\\(1b\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(4h\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.1\\\\(1c\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3k\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(2c\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(4e\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(4g\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3i\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(2e\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3g\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(4a\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(2d\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(2d\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(1b\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(4f\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3h\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(2f\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(4c\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3a\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(1c\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3d\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(2b\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(4b\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(2e\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(2b\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(4d\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(1d\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3e\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3l\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3b\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(2a\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3j\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(1d\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3o\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.0\\\\(4i\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.1\\\\(1d\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.1\\\\(2a\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:4.1\\\\(1e\\\\):*:*:*:*:*:*:*\", \"cpe:2.3:a:cisco:unified_computing_system:3.2\\\\(3p\\\\):*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"unified_computing_system\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0\\\\(1a\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3n\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.1\\\\(1a\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.1\\\\(1b\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(4h\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.1\\\\(1c\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3k\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(2c\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(4e\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(4g\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3i\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(2e\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3g\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(4a\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(2d\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(2d\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(1b\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(4f\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3h\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(2f\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(4c\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3a\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(1c\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3d\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(2b\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(4b\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(2e\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(2b\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(4d\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(1d\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3e\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3l\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3b\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(2a\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3j\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(1d\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3o\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.0\\\\(4i\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.1\\\\(1d\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.1\\\\(2a\\\\)\"}, {\"status\": \"affected\", \"version\": \"4.1\\\\(1e\\\\)\"}, {\"status\": \"affected\", \"version\": \"3.2\\\\(3p\\\\)\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-18T18:40:14.616Z\"}}], \"cna\": {\"title\": \"Cisco Integrated Management Controller Username Enumeration Vulnerability\", \"source\": {\"defects\": [\"CSCvv07275\"], \"advisory\": \"cisco-sa-cimc-enum-CyheP3B7\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/RL:X/RC:X/E:X\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Unified Computing System (Managed)\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0(1a)\"}, {\"status\": \"affected\", \"version\": \"3.2(3n)\"}, {\"status\": \"affected\", \"version\": \"4.1(1a)\"}, {\"status\": \"affected\", \"version\": \"4.1(1b)\"}, {\"status\": \"affected\", \"version\": \"4.0(4h)\"}, {\"status\": \"affected\", \"version\": \"4.1(1c)\"}, {\"status\": \"affected\", \"version\": \"3.2(3k)\"}, {\"status\": \"affected\", \"version\": \"3.2(2c)\"}, {\"status\": \"affected\", \"version\": \"4.0(4e)\"}, {\"status\": \"affected\", \"version\": \"4.0(4g)\"}, {\"status\": \"affected\", \"version\": \"3.2(3i)\"}, {\"status\": \"affected\", \"version\": \"4.0(2e)\"}, {\"status\": \"affected\", \"version\": \"3.2(3g)\"}, {\"status\": \"affected\", \"version\": \"4.0(4a)\"}, {\"status\": \"affected\", \"version\": \"4.0(2d)\"}, {\"status\": \"affected\", \"version\": \"3.2(2d)\"}, {\"status\": \"affected\", \"version\": \"4.0(1b)\"}, {\"status\": \"affected\", \"version\": \"4.0(4f)\"}, {\"status\": \"affected\", \"version\": \"3.2(3h)\"}, {\"status\": \"affected\", \"version\": \"3.2(2f)\"}, {\"status\": \"affected\", \"version\": \"4.0(4c)\"}, {\"status\": \"affected\", \"version\": \"3.2(3a)\"}, {\"status\": \"affected\", \"version\": \"4.0(1c)\"}, {\"status\": \"affected\", \"version\": \"3.2(3d)\"}, {\"status\": \"affected\", \"version\": \"3.2(2b)\"}, {\"status\": \"affected\", \"version\": \"4.0(4b)\"}, {\"status\": \"affected\", \"version\": \"3.2(2e)\"}, {\"status\": \"affected\", \"version\": \"4.0(2b)\"}, {\"status\": \"affected\", \"version\": \"4.0(4d)\"}, {\"status\": \"affected\", \"version\": \"3.2(1d)\"}, {\"status\": \"affected\", \"version\": \"3.2(3e)\"}, {\"status\": \"affected\", \"version\": \"3.2(3l)\"}, {\"status\": \"affected\", \"version\": \"3.2(3b)\"}, {\"status\": \"affected\", \"version\": \"4.0(2a)\"}, {\"status\": \"affected\", \"version\": \"3.2(3j)\"}, {\"status\": \"affected\", \"version\": \"4.0(1d)\"}, {\"status\": \"affected\", \"version\": \"3.2(3o)\"}, {\"status\": \"affected\", \"version\": \"4.0(4i)\"}, {\"status\": \"affected\", \"version\": \"4.1(1d)\"}, {\"status\": \"affected\", \"version\": \"4.1(2a)\"}, {\"status\": \"affected\", \"version\": \"4.1(1e)\"}, {\"status\": \"affected\", \"version\": \"3.2(3p)\"}], \"defaultStatus\": \"unknown\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco\\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-enum-CyheP3B7\", \"name\": \"cisco-sa-cimc-enum-CyheP3B7\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns\", \"name\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3\", \"name\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-teams-xss-zLW9tD3\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD\", \"name\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-zWkppJxL\", \"name\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-zWkppJxL\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in Cisco Integrated Management Controller could allow an unauthenticated, remote attacker to enumerate valid usernames within the vulnerable application.\\r\\nThe vulnerability is due to differences in authentication responses sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to the affected application. A successful exploit could allow the attacker to confirm the names of administrative user accounts for use in further attacks.There are no workarounds that address this vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-203\", \"description\": \"Observable Discrepancy\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-11-18T16:06:00.592Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2020-26062\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-18T18:46:04.617Z\", \"dateReserved\": \"2020-09-24T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2024-11-18T16:06:00.592Z\", \"assignerShortName\": \"cisco\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.