First published: Wed Apr 24 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20356 has a critical severity rating due to its potential for command injection and privilege escalation.
To mitigate CVE-2024-20356, update the Cisco Integrated Management Controller to the latest patched version provided by Cisco.
CVE-2024-20356 affects systems running vulnerable versions of the Cisco Integrated Management Controller with Administrator-level access.
Yes, CVE-2024-20356 can be exploited by an authenticated remote attacker with Admin privileges.
CVE-2024-20356 can facilitate command injection attacks, allowing an attacker to execute arbitrary commands on the system.