{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T12:23:38.920","vulnerabilities":[{"cve":{"id":"CVE-2019-1908","sourceIdentifier":"psirt@cisco.com","published":"2019-08-21T19:15:15.230","lastModified":"2024-11-21T04:37:39.833","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Intelligent Platform Management Interface (IPMI) implementation of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to view sensitive system information. The vulnerability is due to insufficient security restrictions imposed by the affected software. A successful exploit could allow the attacker to view sensitive information that belongs to other users. The attacker could then use this information to conduct additional attacks."},{"lang":"es","value":"Una vulnerabilidad en la implementación de la Interfaz de administración de plataforma inteligente (IPMI) de Cisco Integrated Management Controller (IMC) podría permitir que un atacante remoto no autenticado vea información confidencial del sistema. La vulnerabilidad se debe a restricciones de seguridad insuficientes impuestas por el software afectado. Una explotación exitosa podría permitir al atacante ver información confidencial que pertenece a otros usuarios. El atacante podría usar esta información para realizar ataques adicionales."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:unified_computing_system:4.0\\(1c\\)hs3:*:*:*:*:*:*:*","matchCriteriaId":"39F8601E-730B-489B-AD2A-FD10FAF28595"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0.0","versionEndExcluding":"2.0\\(13o\\)","matchCriteriaId":"416F7C96-3EF0-4B6D-B414-3FC0D0848144"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0.0","versionEndExcluding":"3.0\\(4k\\)","matchCriteriaId":"0056011A-04F0-4185-8EE7-B1B30CAAA863"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0.0","versionEndExcluding":"4.0\\(4b\\)","matchCriteriaId":"59EE9E78-D09E-4069-BC84-ED42E3EE76F1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*","matchCriteriaId":"ADD4A429-F168-460B-A964-8F1BD94C6387"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_c4200:-:*:*:*:*:*:*:*","matchCriteriaId":"BD25964B-08B7-477E-A507-5FE5EE7CD286"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*","matchCriteriaId":"2FDC8A69-0914-44C1-8AEA-262E0A285C81"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0.0","versionEndExcluding":"4.0\\(2f\\)","matchCriteriaId":"F5549F4C-CF65-4F22-9675-EFAA99964CA0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_c125_m5:-:*:*:*:*:*:*:*","matchCriteriaId":"ADD4A429-F168-460B-A964-8F1BD94C6387"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_c4200:-:*:*:*:*:*:*:*","matchCriteriaId":"BD25964B-08B7-477E-A507-5FE5EE7CD286"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*","matchCriteriaId":"2FDC8A69-0914-44C1-8AEA-262E0A285C81"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-infodisc","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-infodisc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}