A vulnerability in Cisco HyperFlex Software could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack. The vulnerability is due to insufficient key management. An attacker could exploit this vulnerability by obtaining a specific encryption key for the cluster. A successful exploit could allow the attacker to perform a man-in-the-middle attack against other nodes in the cluster.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Hyperflex_hx220c_m5_firmware | Cisco | 3.0(1a) (including) | 3.0(1a) (including) |
Hyperflex_hx220c_m5_firmware | Cisco | 3.5(2a) (including) | 3.5(2a) (including) |