First published: Wed Feb 26 2020(Updated: )
A vulnerability in the local management (local-mgmt) CLI of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to specific commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user for all affected platforms excluding Cisco UCS 6400 Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric Interconnects, the injected commands are executed with root privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Manager | =4.0\(1a\)a | |
Cisco UCS 6248UP | ||
Cisco UCS 6296UP | ||
Cisco UCS 6324 firmware | ||
Cisco UCS 6332 | ||
Cisco UCS 6332-16UP | ||
Cisco UCS 64108 | ||
Cisco UCS 6454 Fabric Interconnect | ||
Cisco FX-OS | =2.4\(1.214\) | |
Cisco FX-OS | =2.4\(1.216\) | |
Cisco Firepower 2110 | ||
Cisco Firepower 2120 | ||
Cisco Firepower 2130 | ||
Cisco Firepower 2140 | ||
Cisco Firepower 4110 Next-Generation Firewall | ||
Cisco Firepower 4115 | ||
Cisco Firepower 4120 Next-Generation Firewall | ||
Cisco Firepower 4125 firmware | ||
Cisco Firepower 4140 Next-Generation Firewall | ||
Cisco Firepower 4145 firmware | ||
Cisco Firepower 4150 Next-Generation Firewall | ||
Cisco Firepower 9300 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.