Impact
The vulnerability is caused by incorrect input validation in the web‑based management interface of Cisco IMC. An attacker who is authenticated and holds administrator‑level privileges can send specially crafted HTTP requests that result in arbitrary code execution as the root operating system user. This allows the attacker to modify system files, install malicious payloads, or disrupt services, thereby compromising confidentiality, integrity and availability of the affected device.
Affected Systems
The impact reaches Cisco Unified Computing System devices running in standalone mode. No specific firmware or software version is mentioned, so any device of this type that has not been updated to receive the fix remains vulnerable.
Risk and Exploitability
The CVSS base score of 6.5 places the vulnerability in the medium severity range according to NIST guidelines. Because no EPSS score is provided, the current likelihood of exploitation is unclear, and it is not listed in the CISA KEV catalog. Exploitation requires remote access to the management interface and valid administrator credentials, which limits the attack surface but still presents a significant risk if privileged accounts are compromised or poorly secured.
OpenCVE Enrichment