This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco UCS Director. Authentication is not required to exploit this vulnerability. The specific flaw exists within the saveStaticConfig method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-9596 is rated as critical due to its ability to allow remote attackers to execute arbitrary code.
To fix ZDI-CAN-9596, update Cisco UCS Director to the latest version as recommended by Cisco's security advisory.
No authentication is required to exploit ZDI-CAN-9596, making it accessible to remote attackers.
ZDI-CAN-9596 allows attackers to execute arbitrary code on affected installations of Cisco UCS Director.
The specific versions affected by ZDI-CAN-9596 are detailed in the Cisco security advisory for UCS Director.