Impact
The flaw resides in the change password feature of Cisco Integrated Management Controller, where improper input validation (CWE-20) causes the system to ignore authentication data. An attacker who sends a specially crafted HTTP request can bypass authentication entirely, change any user’s password—including the Admin account— and then assume administrative control. This provides full read‑write access to the device, compromising confidentiality, integrity, and availability of all managed resources.
Affected Systems
The vulnerability impacts Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E‑Series Software. Because specific version details are not listed, all releases containing the affected IMC component should be considered potentially vulnerable.
Risk and Exploitability
With a CVSS score of 9.8 the vulnerability is classified as critical. The Exploit Prediction Scoring System score is unavailable and the issue is not yet listed in the CISA KEV catalog, suggesting no publicly known exploits at present. However, an unauthenticated attacker can exploit it remotely over HTTP by sending a crafted request, enabling the attacker to gain full administrative privileges and potentially compromise the entire system.
OpenCVE Enrichment