CVE-2020-3371

A vulnerability in the web UI of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary code and execute arbitrary commands at the underlying operating system level. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary commands at the underlying operating system level.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CIMC-CIV-pKDBe9x5 - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CIMC-CIV-pKDBe9x5 - Vendor Advisory
CVSS v2 : 9.0
v3 : 8.8
v2 : 9.0
v3 : 6.3

Information

Published : 2020-11-06 19:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3371

Mitre link : CVE-2020-3371

CVE.ORG link : CVE-2020-3371


JSON object : View

Products Affected

cisco

  • integrated_management_controller
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')