A vulnerability in an operations script of Cisco UCS Central could allow an authenticated, remote attacker to execute arbitrary shell commands with the privileges of the daemon user.

The vulnerability is due to insufficient input validation.

An attacker could exploit this vulnerability by posting a crafted request to the user interface of Cisco UCS Central.

Cisco has released software updates that address this vulnerability.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucsc

Security Impact Rating: High

CVE: CVE-2018-0113

Leave a Reply