First published: Wed Apr 17 2024(Updated: )
A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Integrated Management Controller Supervisor |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-cimc-cmd-inj-mUx4c5AJ is considered critical due to its potential for command injection and privilege escalation.
To fix cisco-sa-cimc-cmd-inj-mUx4c5AJ, update the Cisco Integrated Management Controller to the latest available version.
Authenticated, local users with access to the CLI of the Cisco Integrated Management Controller are affected by cisco-sa-cimc-cmd-inj-mUx4c5AJ.
Exploitation of cisco-sa-cimc-cmd-inj-mUx4c5AJ can lead to command injection attacks and elevation of privileges to root.
Yes, an authenticated local attacker is required to exploit cisco-sa-cimc-cmd-inj-mUx4c5AJ.