A successful exploit could allow the attacker to cause internal system processes to fail to terminate properly, which could result in a buildup of stuck processes and lead to slowness in accessing the UCS Manager CLI and web UI. An attacker could exploit this vulnerability by executing specific commands on the local-mgmt CLI on an affected device. The vulnerability is due to improper handling of CLI command parameters. On Cisco UCS 6400 Series Fabric Interconnects, the injected commands are executed with root privileges.ġ08 Firepower 1010, Firepower 1120, Firepower 1140 and 105 moreĪ vulnerability in the local management (local-mgmt) CLI of Cisco UCS Manager Software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user for all affected platforms excluding Cisco UCS 6400 Series Fabric Interconnects. An attacker could exploit this vulnerability by including crafted arguments to specific commands. The vulnerability is due to insufficient input validation. A successful exploit could allow the attacker to read or write to arbitrary files on the underlying OS.Ģ7 Adaptive Security Appliance Software, Firepower 1010, Firepower 1120 and 24 moreĪ vulnerability in the CLI of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS). An attacker could exploit this vulnerability by including crafted arguments to a specific CLI command. 19 Adaptive Security Appliance Software, Firepower 1010, Firepower 1120 and 16 moreĪ vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to read or write arbitrary files on the underlying operating system (OS).
0 Comments
Leave a Reply. |