Session Hijacking Vulnerability in Cisco Integrated Management Controller
CVE-2017-6617

5.4MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
20 April 2017

Summary

A vulnerability in the session management of the Cisco Integrated Management Controller (IMC) web-based GUI could allow an unauthenticated attacker to hijack valid user sessions. This issue arises because the system fails to generate a new session identifier after a user logs in. By exploiting this flaw, attackers can use a compromised session identifier to gain unauthorized access to the software. A successful exploitation could enable them to control the session of an authenticated user, jeopardizing the integrity and security of the user's access.

Affected Version(s)

Cisco Integrated Management Controller Cisco Integrated Management Controller

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.