CVE-2024-20365
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
02/10/2024
Last modified:
08/10/2024
Description
A vulnerability in the Redfish API of Cisco UCS B-Series, Cisco UCS Managed C-Series, and Cisco UCS X-Series Servers could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root.<br />
<br />
This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending crafted commands through the Redfish API on an affected device. A successful exploit could allow the attacker to elevate privileges to root.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:unified_computing_system:4.1\(2a\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(2b\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(2c\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3a\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3b\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3c\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3d\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3e\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3f\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3h\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3i\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3j\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3k\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3l\):*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:unified_computing_system:4.1\(3m\):*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



