Impact
A command‑injection flaw in the web‑based management interface of Cisco Integrated Management Controller (IMC) permits an authenticated attacker with administrative privileges to inject arbitrarily‑crafted commands, causing those commands to run with root privileges on the underlying operating system. The flaw stems from inadequate input validation, identified as a classic operating‑system command injection (CWE‑77). Successful exploitation gives the attacker full control over the host, compromising confidentiality, integrity, and availability of the impacted system. Cisco rates the security impact high because of the root‑level execution and potential downstream attacks.
Affected Systems
Vendors and products affected include Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E‑Series Software (UCSE). Specific version numbers were not disclosed in the advisory. Administrators should verify whether their installations correspond to these product lines.
Risk and Exploitability
The CVSS base score reported is 6.5, indicating a moderate to high severity, while the exploitation probability score is not provided and the vulnerability is not listed in the CISA KEV catalog. The exploitation path requires network access to the web interface and authenticated administrative credentials. Though no publicly disclosed exploit is known at this time, the combination of root privilege escalation and command injection represents a significant risk. Remediation is recommended promptly to mitigate the potential impact of this vulnerability.
OpenCVE Enrichment