Impact
A local, authenticated attacker with administrative privileges can submit crafted input to the web‑based management interfaces of Cisco FXOS and UCS Manager, triggering execution of arbitrary system commands. The flaw arises from inadequate validation of command arguments, allowing an attacker to gain root‑level access and modify or compromise the underlying operating system.
Affected Systems
The vulnerability affects Cisco FXOS Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Unified Computing System (Managed) devices. No specific version information was provided.
Risk and Exploitability
The flaw carries a CVSS score of 6.7 and an EPSS below 1%, indicating moderate severity but low current exploitation probability. It is not listed in the CISA KEV catalog. Successful exploitation requires valid administrative credentials, limiting the attack surface to authorized users. Once exploited, the attacker can execute any command with root privileges, creating a full compromise of the device.
OpenCVE Enrichment