Remote Code Execution Vulnerability in Cisco Integrated Management Controller Software
CVE-2017-6616

8.8HIGH

Key Information:

Vendor
Cisco
Vendor
CVE Published:
20 April 2017

Summary

A vulnerability in the web-based management interface of Cisco Integrated Management Controller IMC versions 3.0(1c) allows an authenticated remote attacker to execute arbitrary code on the affected system. This vulnerability arises from inadequate sanitization of parameters in user-supplied HTTP requests. An attacker can exploit this weakness by sending a specially crafted HTTP request, potentially allowing the execution of arbitrary code with the privileges of the current user. Awareness of this vulnerability is crucial for maintaining the security of impacted systems. For more detailed information, refer to Cisco's security advisory.

Affected Version(s)

Cisco Integrated Management Controller Cisco Integrated Management Controller

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.