OS Command Injection in Cisco Integrated Management Controller - CVE-2019-1864

 

OS Command Injection in Cisco Integrated Management Controller - CVE-2019-1864

Published: August 22, 2019 / Updated: August 22, 2019


Vulnerability identifier: #VU20366
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2019-1864
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Integrated Management Controller

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to insufficient validation of command input in the web-based management interface. A remote authenticated attacker with read-only privileges can send a specially crafted commands to the web-based management interface, inject and execute arbitrary system-level commands with root privileges on the target device.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

This vulnerability affects the following Cisco products that are running Cisco IMC Software:

  • UCS C-Series and S-Series Servers in standalone mode 
  • UCS E-Series Servers
  • 5000 Series Enterprise Network Compute System (ENCS) Platform

How to mitigate CVE-2019-1864

Install updates from vendor's website.

Sources