A vulnerability in the Redfish API of Cisco UCS B-Series, Cisco UCS Managed C-Series, and Cisco UCS X-Series Servers could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root. This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending crafted commands through the Redfish API on an affected device. A successful exploit could allow the attacker to elevate privileges to root.
History

Tue, 08 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Cisco unified Computing System
CPEs cpe:2.3:a:cisco:unified_computing_system:4.1\(2a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(2b\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(2c\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3b\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3c\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3d\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3e\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3f\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3h\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3i\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3j\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3k\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3l\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(3m\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.1\(4a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(1c\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(1d\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(1f\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(1i\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(1k\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(1l\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(1m\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(1n\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(2a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(2c\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(2d\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(2e\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(3b\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(3d\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(3e\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(3g\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(3h\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(3i\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(3j\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.2\(3k\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.3\(2b\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.3\(2c\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.3\(2e\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.3\(3a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.3\(3c\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.3\(4a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:unified_computing_system:4.3\(4b\):*:*:*:*:*:*:*
Vendors & Products Cisco unified Computing System

Wed, 02 Oct 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco unified Computing System Manager Firmware
CPEs cpe:2.3:o:cisco:unified_computing_system_manager_firmware:*:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco unified Computing System Manager Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 02 Oct 2024 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Redfish API of Cisco UCS B-Series, Cisco UCS Managed C-Series, and Cisco UCS X-Series Servers could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root. This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending crafted commands through the Redfish API on an affected device. A successful exploit could allow the attacker to elevate privileges to root.
Title Cisco Integrated Management Controller Redfish Command Injection Vulnerability
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-10-02T16:52:46.381Z

Updated: 2024-10-02T20:08:13.029Z

Reserved: 2023-11-08T15:08:07.652Z

Link: CVE-2024-20365

cve-icon Vulnrichment

Updated: 2024-10-02T20:05:11.887Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-02T17:15:14.863

Modified: 2024-10-08T14:28:42.727

Link: CVE-2024-20365

cve-icon Redhat

No data.