Impact
The vulnerability stems from unnecessary file‑write permissions granted to users with read‑only privileges in the NX‑OS CLI of Cisco UCS Manager. An authenticated local attacker can log in as a read‑only user, connect through the CLI, and create or overwrite files on the device’s file system, potentially enabling further limited privileged actions. This weakness is a classic example of CWE‑250, where improper restriction of user privileges leads to unauthorized file modifications.
Affected Systems
The affected environment is Cisco Unified Computing System (Managed) – UCS Manager. No specific product or firmware version numbers are disclosed in the advisory, so all current UCS Manager releases may be at risk until Cisco publishes a patch.
Risk and Exploitability
The CVSS base score of 4.4 indicates a moderate impact, and the EPSS score of less than 1% shows that the probability of exploitation is very low at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated user with read‑only access and local CLI connectivity; it cannot be leveraged remotely. While the likelihood of an attack is low, the impact of unauthorized file changes could undermine system integrity and configuration management.
OpenCVE Enrichment