Impact
A flaw in the web‑based management interface of Cisco Integrated Management Controller allows an authenticated remote attacker with administrative privileges to inject and execute arbitrary commands as the system’s root user. The vulnerability arises from improper validation of user supplied input, enabling command injection that can compromise system confidentiality, integrity, and availability.
Affected Systems
Affected vendors include Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E‑Series Software. Specific product versions are not listed in the advisory, so any release of these products may be impacted until a patch is applied.
Risk and Exploitability
The CVSS score of 6.5 reflects the severity of this remote code execution risk. The EPSS score is not available, and the vulnerability is not in the CISA KEV catalog. Exploitation requires network access to the web interface and valid administrator credentials, after which the attacker can run shell commands with root privileges, potentially leading to full system compromise.
OpenCVE Enrichment