First published: Wed Feb 20 2019(Updated: )
A vulnerability in the cluster service manager of Cisco HyperFlex Software could allow an unauthenticated, adjacent attacker to execute commands as the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting to the cluster service manager and injecting commands into the bound process. A successful exploit could allow the attacker to run commands on the affected host as the root user. This vulnerability affects Cisco HyperFlex Software releases prior to 3.5(2a).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco HyperFlex HX Data Platform | =3.0\(1a\) | |
Cisco HyperFlex HX Data Platform | =3.5\(1a\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15380 is a vulnerability in the cluster service manager of Cisco HyperFlex Software that allows an unauthenticated attacker to execute commands as the root user.
CVE-2018-15380 occurs due to insufficient input validation in the cluster service manager of Cisco HyperFlex Software.
CVE-2018-15380 has a severity rating of 8.8, which is considered high.
CVE-2018-15380 affects Cisco HyperFlex HX Data Platform versions 3.0(1a) and 3.5(1a).
To fix CVE-2018-15380, users should apply the necessary updates or patches provided by Cisco.