Impact
A flaw in the web‑based management interface of Cisco Integrated Management Controller allows an authenticated remote user with read‑only access to inject arbitrary shell commands. The vulnerability arises from improper validation of user input, enabling a command‑injection exploit that runs as root. An attacker can execute any command on the underlying operating system, compromising confidentiality, integrity, and availability of the affected system.
Affected Systems
The issue affects Cisco Unified Computing System (Standalone) and Cisco Unified Computing System E‑Series Software, specifically the IMC component of these products. No specific firmware or software versions are listed, so all deployments using these products are potentially vulnerable until a vendor update is applied.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity. Exploitation requires network access to the web interface and authentication with a read‑only account, which is typically provided over the network. Once authenticated, crafted payloads are executed with root privileges, allowing full system compromise. The combination of remote attack surface, elevated privileges, and high impact warrants immediate remediation.
OpenCVE Enrichment