First published: Wed Apr 17 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-cimc-cmd-inj-bLuPcb is classified as high due to the potential for command injection attacks.
To fix cisco-sa-cimc-cmd-inj-bLuPcb, apply the recommended patches provided by Cisco for the affected versions of the Integrated Management Controller.
Cisco Integrated Management Controller users with Administrator-level privileges may be affected by cisco-sa-cimc-cmd-inj-bLuPcb.
cisco-sa-cimc-cmd-inj-bLuPcb can lead to command injection attacks that may allow attackers to elevate their privileges.
Yes, user authentication with Administrator-level privileges is required to exploit the cisco-sa-cimc-cmd-inj-bLuPcb vulnerability.