A vulnerability in the web UI of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary code and execute arbitrary commands at the underlying operating system level. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary commands at the underlying operating system level.
References
Configurations
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CIMC-CIV-pKDBe9x5 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 6.3 |
Information
Published : 2020-11-06 19:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-3371
Mitre link : CVE-2020-3371
CVE.ORG link : CVE-2020-3371
JSON object : View
Products Affected
cisco
- integrated_management_controller
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')