First published: Wed Nov 04 2020(Updated: )
A vulnerability in the web UI of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary code and execute arbitrary commands at the underlying operating system level. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary commands at the underlying operating system level. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CIMC-CIV-pKDBe9x5
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-CIMC-CIV-pKDBe9x5 is classified as critical due to its potential for remote code execution.
To fix cisco-sa-CIMC-CIV-pKDBe9x5, update your Cisco Integrated Management Controller to the latest patched version.
Organizations using vulnerable versions of the Cisco Integrated Management Controller are at risk due to cisco-sa-CIMC-CIV-pKDBe9x5.
The implications of cisco-sa-CIMC-CIV-pKDBe9x5 include unauthorized access and control over the underlying operating system.
An attacker can exploit cisco-sa-CIMC-CIV-pKDBe9x5 by injecting arbitrary commands through the insufficiently validated web UI.