Cisco IMC Vulnerability Could Lead to Command Injection and Privilege Escalation
CVE-2024-20356
Key Information:
- Vendor
- Cisco
- Status
- Vendor
- CVE Published:
- 24 April 2024
Badges
Summary
A security vulnerability exists in the web-based management interface of Cisco's Integrated Management Controller, which presents a significant risk for systems utilizing this management platform. The flaw is attributed to inadequate validation of user input, allowing remote attackers with Administrator-level access to conduct command injection attacks. By exploiting this vulnerability, an attacker can send specially crafted commands to the management interface, potentially gaining unauthorized root access to the system. This can lead to complete control over the affected device, emphasizing the need for immediate attention and remediation to safeguard sensitive information and critical systems.
Affected Version(s)
Cisco Unified Computing System (Standalone) 3.0(1c)
Cisco Unified Computing System (Standalone) 3.0(1d)
Cisco Unified Computing System (Standalone) 3.0(3a)
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
CVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM
Exploiting remote code execution in Cisco's CIMC management system and jailbreaking the device to run untrusted code
10 months ago
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
Vulnerability published
- 👾
Exploit known to exist
- 📰
First article discovered by LRQA Nettitude
Vulnerability Reserved