First published: Thu Apr 20 2017(Updated: )
A vulnerability in the web-based GUI of Cisco Integrated Management Controller (IMC) 3.0(1c) could allow an authenticated, remote attacker to execute arbitrary code on an affected system. The vulnerability exists because the affected software does not sufficiently sanitize specific values that are received as part of a user-supplied HTTP request. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the user on the affected system. Cisco Bug IDs: CSCvd14578.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor | =3.0\(1c\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-6616 is considered high due to its potential for remote code execution.
To fix CVE-2017-6616, upgrade to a fixed version of Cisco Integrated Management Controller that addresses the vulnerability.
The potential impacts of CVE-2017-6616 include unauthorized access and control over the affected Cisco system.
CVE-2017-6616 affects users of Cisco Integrated Management Controller version 3.0(1c).
Yes, CVE-2017-6616 is remote exploitable as it can be triggered by an authenticated attacker over the network.