First published: Wed Aug 26 2020(Updated: )
A vulnerability in the local management (local-mgmt) CLI of Cisco UCS Manager Software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of CLI command parameters. An attacker could exploit this vulnerability by executing specific commands on the local-mgmt CLI on an affected device. A successful exploit could allow the attacker to cause internal system processes to fail to terminate properly, which could result in a buildup of stuck processes and lead to slowness in accessing the UCS Manager CLI and web UI. A sustained attack may result in a restart of internal UCS Manager processes and a temporary loss of access to the UCS Manager CLI and web UI. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-cli-dos-GQUxCnTe
Credit: This vulnerability was found by Art Kalmykov Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Software | =4.0<4.0(4i) | 4.0(4i) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco UCS Manager Software vulnerability is cisco-sa-ucs-cli-dos-GQUxCnTe.
The title of this vulnerability is Cisco UCS Manager Software Local Management CLI Denial of Service Vulnerability.
The severity rating for this vulnerability is low (3.3).
An attacker can exploit this vulnerability by using the local management (local-mgmt) CLI of Cisco UCS Manager Software to cause a denial of service (DoS) condition on an affected device.
Yes, Cisco UCS Manager Software version 4.0(4i) or higher includes a fix for this vulnerability.