First published: Wed Oct 20 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to cause the web-based management interface to unexpectedly restart. The vulnerability is due to insufficient input validation on the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause the interface to restart, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imc-gui-dos-TZjrFyZh
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS C-Series Rack Servers | =4.2<4.2(1b)=4.1 and earlier<4.1(2g) | 4.2(1b) 4.1(2g) |
Cisco UCS S-Series Storage Servers | =4.1 and earlier<4.1(3e)1 | 4.1(3e)1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-imc-gui-dos-TZjrFyZh is critical due to its potential to allow unauthenticated remote attackers to disrupt the management interface.
To fix cisco-sa-imc-gui-dos-TZjrFyZh, upgrade to the patched versions of Cisco UCS C-Series and S-Series software as specified in the advisory.
The affected products include Cisco UCS C-Series Rack Servers and Cisco UCS S-Series Storage Servers running specific versions of the software.
The consequences of the cisco-sa-imc-gui-dos-TZjrFyZh vulnerability include the potential for the web management interface to restart unexpectedly, impacting server management.
Yes, the cisco-sa-imc-gui-dos-TZjrFyZh vulnerability can be exploited by unauthenticated remote attackers.