A vulnerability in the Redfish API of Cisco UCS B-Series, Cisco UCS Managed C-Series, and Cisco UCS X-Series Servers could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root.
This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending crafted commands through the Redfish API on an affected device. A successful exploit could allow the attacker to elevate privileges to root.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco unified Computing System
|
|
CPEs | cpe:2.3:a:cisco:unified_computing_system:4.1\(2a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(2b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(2c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3f\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3h\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3i\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3j\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3k\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3l\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(3m\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.1\(4a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(1c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(1d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(1f\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(1i\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(1k\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(1l\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(1m\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(1n\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(2a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(2c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(2d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(2e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(3b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(3d\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(3e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(3g\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(3h\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(3i\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(3j\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.2\(3k\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.3\(2b\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.3\(2c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.3\(2e\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.3\(3a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.3\(3c\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.3\(4a\):*:*:*:*:*:*:* cpe:2.3:a:cisco:unified_computing_system:4.3\(4b\):*:*:*:*:*:*:* |
|
Vendors & Products |
Cisco unified Computing System
|
Wed, 02 Oct 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco unified Computing System Manager Firmware |
|
CPEs | cpe:2.3:o:cisco:unified_computing_system_manager_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cisco
Cisco unified Computing System Manager Firmware |
|
Metrics |
ssvc
|
Wed, 02 Oct 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Redfish API of Cisco UCS B-Series, Cisco UCS Managed C-Series, and Cisco UCS X-Series Servers could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root. This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending crafted commands through the Redfish API on an affected device. A successful exploit could allow the attacker to elevate privileges to root. | |
Title | Cisco Integrated Management Controller Redfish Command Injection Vulnerability | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-10-02T16:52:46.381Z
Updated: 2024-10-02T20:08:13.029Z
Reserved: 2023-11-08T15:08:07.652Z
Link: CVE-2024-20365
Vulnrichment
Updated: 2024-10-02T20:05:11.887Z
NVD
Status : Analyzed
Published: 2024-10-02T17:15:14.863
Modified: 2024-10-08T14:28:42.727
Link: CVE-2024-20365
Redhat
No data.