Cisco IMC Vulnerability Could Lead to Command Injection and Privilege Escalation

CVE-2024-20356
8.7HIGH

Key Information

Vendor
Cisco
Status
Cisco Unified Computing System (standalone)
Cisco Unified Computing System E-series Software (ucse)
Vendor
CVE Published:
24 April 2024

Badges

👾 Exploit Exists📰 News Worthy

Summary

A vulnerability, identified as CVE-2023-51467, has been discovered in the Apache OFBiz open source enterprise resource planning (ERP) system, with a high CVSS score of 9.8. This flaw allows attackers to bypass authentication processes and execute server-side request forgery (SSRF), potentially leading to remote code execution. The vulnerability was revealed during a root cause analysis of a previous vulnerability in Apache OFBiz, indicating it was the result of an incomplete patch for the earlier flaw. There have been attempts to exploit this vulnerability in the wild, pointing to active interest and potential use by threat actors, including ransomware groups. The developers of Apache OFBiz have released version 18.12.11 to address the issue, and organizations are strongly encouraged to upgrade to this version promptly to mitigate the risk. Prior to the release of the patch, there were around 170 internet-exposed instances of OFBiz, but the number has since decreased significantly. However, the existence of publicly available proof-of-concept exploits and observed scanning activities for vulnerable systems highlight the urgency of addressing this vulnerability. Exploiting CVE-2023-51467 can allow unauthorized access and control over affected systems, potentially leading to data breaches, system compromise, and further spread of malware. This vulnerability is part of a larger pattern of critical vulnerabilities being targeted in Apache software, emphasizing the importance of timely patching and security vigilance to protect against advanced cyber threats.

Affected Version(s)

Cisco Unified Computing System (Standalone) = 3.0(1c)

Cisco Unified Computing System (Standalone) = 3.0(1d)

Cisco Unified Computing System (Standalone) = 3.0(3a)

News Articles

CVSS V3.1

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • 👾

    Exploit exists.

  • Vulnerability published.

  • First article discovered by LRQA Nettitude

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database0 Proof of Concept(s)2 News Article(s)
.