First published: Wed May 05 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR
Credit: Nikita Abramov Positive Technologies for reporting these vulnerabilitiesMikhail Klyuchnikov Positive Technologies for reporting these vulnerabilities
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco HyperFlex HX | =4.5<4.5(2a)=4.0<4.0(2e)=Earlier than 4.0<Migrate to 4.0(2e) | 4.5(2a) 4.0(2e) Migrate to 4.0(2e) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of this vulnerability is critical with a CVSS score of 9.8.
The affected software is Cisco HyperFlex HX versions 4.5(2a), 4.0(2e), and earlier.
An attacker can exploit this vulnerability by performing command injection attacks through the web-based management interface of Cisco HyperFlex HX.
To fix this vulnerability, it is recommended to migrate to version 4.0(2e) or later of Cisco HyperFlex HX.
More information about this vulnerability can be found on the Cisco Security Advisory page at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR.