Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2018-0362

CVE information

Published

5 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

Medium

Impact Analysis

Description

A vulnerability in BIOS authentication management of Cisco 5000 Series Enterprise Network Compute System and Cisco Unified Computing (UCS) E-Series Servers could allow an unauthenticated, local attacker to bypass the BIOS authentication and execute actions as an unprivileged user. The vulnerability is due to improper security restrictions that are imposed by the affected system. An attacker could exploit this vulnerability by submitting an empty password value to an affected device's BIOS authentication prompt. An exploit could allow the attacker to have access to a restricted set of user-level BIOS commands. Cisco Bug IDs: CSCvh83260..

CVSSv2.0 Score

Severity
Medium
Base Score
4.6/10
Exploit Score
3.9/10
Access Vector
Local
Access Complexity
Low
Authentication Required
None
Impact Score
6.4/10
Confidentiality Impact
Partial
Availability Impact
Partial
Integrity Impact
Partial

CVSSv3.1 Score

Severity
Medium
Base Score
4.3/10
Exploit Score
0.9/10
Access Vector
Physical
Access Complexity
Low
Privileges Required
None
Impact Score
3.4/10
Confidentiality Impact
Low
Availability Impact
Low
Integrity Impact
Low
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:cisco:5400_enterprise_network_compute_system_firmw
  Yes
-
cpe:2.3:h:cisco:5400_enterprise_network_compute_system:-:*:*
  No
-
cpe:2.3:o:cisco:5100_enterprise_network_compute_system_firmw
  Yes
-
cpe:2.3:h:cisco:5100_enterprise_network_compute_system:-:*:*
  No
-
cpe:2.3:o:cisco:ucs-e160s-m3_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e160s-k9_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e160s-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e180d-m3_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e180d-k9_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e180d-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e1120d-m3_firmware:3.2\(3\):*:*:*:*:*:*:
  Yes
-
cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e1120d-k9_firmware:3.2\(3\):*:*:*:*:*:*:
  Yes
-
cpe:2.3:h:cisco:ucs-e1120d-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e140s-m2_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e140s-k9_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e140s-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e160d-m2_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e160d-m2:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e160d-k9_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e160d-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e180d-m2_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e180d-m2:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e180d-k9_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e180d-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e140s-m1_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e140s-m1:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e140s-k9_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e140s-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e160d-m1_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e160d-m1:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e160d-k9_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e160d-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e160dp-m1_firmware:3.2\(3\):*:*:*:*:*:*:
  Yes
-
cpe:2.3:h:cisco:ucs-e160dp-m1:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e160dp-k9_firmware:3.2\(3\):*:*:*:*:*:*:
  Yes
-
cpe:2.3:h:cisco:ucs-e160dp-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e140d-m1_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e140d-m1:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e140d-k9_firmware:3.2\(3\):*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:cisco:ucs-e140d-k9:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e140dp-m1_firmware:3.2\(3\):*:*:*:*:*:*:
  Yes
-
cpe:2.3:h:cisco:ucs-e140dp-m1:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:cisco:ucs-e140dp-k9_firmware:3.2\(3\):*:*:*:*:*:*:
  Yes
-
cpe:2.3:h:cisco:ucs-e140dp-k9:-:*:*:*:*:*:*:*
  No
-