Cisco Integrated Management Controller Multiple Remote Code Execution Vulnerabilities

cisco-sa-ucs-api-rce-UXwpeDHd · Critical · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

Multiple vulnerabilities in the API subsystem of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges. The vulnerabilities are due to improper boundary checks for certain user-supplied input. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the API subsystem of an affected system. When this request is processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code with root privileges on the underlying operating system (OS). Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-api-rce-UXwpeDHd

Workarounds

There are no workarounds to address this vulnerability.

However, administrators can disable the Cisco IMC web-management interface to mitigate the impact of these vulnerabilities. For example, the following commands show how to perform the configuration change on a UCS C-Series Server:

xxxxxx-bmc# scope http
xxxxxx-bmc /http # xxxxxx-bmc /http # set enabled no SSH is in enabled state. Disabling HTTP service Warning: setting "enabled" to "no" will disconnect all existing http connections and will disable login via WebUI. xxxxxx-bmc /http *# commit xxxxxx-bmc /http # show detail HTTP Settings: HTTP Port: 80 HTTPS Port: 443 Timeout: 1800 Max Sessions: 4 Active Sessions: 0 Enabled: no HTTP Redirected: yes xxxxxx-bmc /http # exit

CVEsCVE-2020-3470
Cisco Bug IDsCSCvu21222 , CSCvu22429 , CSCvu21215 , CSCvu80203
CVSS ScoreBase 9.8
Base 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X

Products with public affected evidence