Impact
A vulnerability in the CLI and web-based management interface of Cisco UCS Manager Software allows an authenticated remote attacker with administrative privileges to execute arbitrary commands with root‑level privileges due to insufficient input validation of command arguments. The resulting Remote Code Execution compromises confidentiality, integrity, and availability of the affected device. This weakness is classified as CWE‑78.
Affected Systems
The affected product is Cisco Unified Computing System (Managed) using UCS Manager Software. Specific version information is not supplied in the advisory.
Risk and Exploitability
The CVSS v3 base score is 6.5, indicating a medium severity. The EPSS score is below 1 % indicating a low probability of exploitation; the vulnerability is not listed in the CISA KEV catalog. Because exploitation requires valid administrative credentials, the attack surface is limited to trusted users, but the impact of a successful exploit is critical. Organizations should treat this as a moderate risk that warrants timely mitigation.
OpenCVE Enrichment