CVE-2024-20356 (GCVE-0-2024-20356)

Vulnerability from cvelistv5 – Published: 2024-04-24 19:40 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Unified Computing System (Standalone) Affected: 3.0(1c)
Affected: 3.0(1d)
Affected: 3.0(3a)
Affected: 3.0(3b)
Affected: 3.0(3e)
Affected: 3.0(4a)
Affected: 3.0(4d)
Affected: 3.0(4e)
Affected: 3.0(4i)
Affected: 3.0(4j)
Affected: 3.0(4k)
Affected: 3.0(4l)
Affected: 3.0(4m)
Affected: 3.0(4n)
Affected: 3.0(4o)
Affected: 3.0(4p)
Affected: 3.0(4q)
Affected: 3.0(4r)
Affected: 3.0(4s)
Affected: 3.1(1d)
Affected: 3.1(2b)
Affected: 3.1(2c)
Affected: 3.1(2d)
Affected: 3.1(2e)
Affected: 3.1(2g)
Affected: 3.1(2i)
Affected: 3.1(3a)
Affected: 3.1(3b)
Affected: 3.1(3c)
Affected: 3.1(3d)
Affected: 3.1(3g)
Affected: 3.1(3h)
Affected: 3.1(3i)
Affected: 3.1(3j)
Affected: 3.1(3k)
Affected: 4.0(1.240)
Affected: 4.0(1a)
Affected: 4.0(1b)
Affected: 4.0(1c)
Affected: 4.0(1d)
Affected: 4.0(1e)
Affected: 4.0(1g)
Affected: 4.0(1h)
Affected: 4.0(2c)
Affected: 4.0(2d)
Affected: 4.0(2f)
Affected: 4.0(2g)
Affected: 4.0(2h)
Affected: 4.0(2i)
Affected: 4.0(2k)
Affected: 4.0(2l)
Affected: 4.0(2m)
Affected: 4.0(2n)
Affected: 4.0(4b)
Affected: 4.0(4c)
Affected: 4.0(4d)
Affected: 4.0(4e)
Affected: 4.0(4f)
Affected: 4.0(4h)
Affected: 4.0(4i)
Affected: 4.0(4j)
Affected: 4.0(4k)
Affected: 4.0(4l)
Affected: 4.0(4m)
Affected: 4.0(2o)
Affected: 4.0(2p)
Affected: 4.0(4n)
Affected: 4.0(2q)
Affected: 4.0(2r)
Affected: 4.1(1c)
Affected: 4.1(1d)
Affected: 4.1(1f)
Affected: 4.1(1g)
Affected: 4.1(2a)
Affected: 4.1(1h)
Affected: 4.1(2b)
Affected: 4.1(2f)
Affected: 4.1(2e)
Affected: 4.1(3b)
Affected: 4.1(2d)
Affected: 4.1(3c)
Affected: 4.1(3d)
Affected: 4.1(2g)
Affected: 4.1(3f)
Affected: 4.1(2h)
Affected: 4.1(2j)
Affected: 4.1(2k)
Affected: 4.1(2l)
Affected: 4.1(3g)
Affected: 4.1(3h)
Affected: 4.1(3i)
Affected: 4.1(3l)
Affected: 4.1(2m)
Affected: 4.1(3m)
Affected: 4.2(1a)
Affected: 4.2(1b)
Affected: 4.2(1c)
Affected: 4.2(1e)
Affected: 4.2(1f)
Affected: 4.2(1g)
Affected: 4.2(1i)
Affected: 4.2(1j)
Affected: 4.2(2a)
Affected: 4.2(2f)
Affected: 4.2(2g)
Affected: 4.2(3b)
Affected: 4.2(3d)
Affected: 4.2(3e)
Affected: 4.2(3g)
Affected: 4.2(3h)
Affected: 4.2(3i)
Affected: 4.2(3j)
Affected: 4.3(1.230097)
Affected: 4.3(1.230124)
Affected: 4.3(1.230138)
Affected: 4.3(2.230207)
Affected: 4.3(2.230270)
Affected: 4.3(2.240002)
Affected: 4.3(3.240022)
Create a notification for this product.
    Cisco Cisco Unified Computing System E-Series Software (UCSE) Affected: 2.1.0
Affected: 2.4.0
Affected: 2.4.1
Affected: 2.4.2
Affected: 3.2.1
Affected: 3.2.2
Affected: 3.2.3
Affected: 3.2.4
Affected: 3.2.6
Affected: 3.2.7
Affected: 3.2.10
Affected: 3.2.11.1
Affected: 3.2.8
Affected: 3.2.11.3
Affected: 3.2.11.5
Affected: 3.2.12.2
Affected: 3.2.13.6
Affected: 3.2.14
Affected: 3.2.15
Affected: 3.1.1
Affected: 3.1.2
Affected: 3.1.3
Affected: 3.1.4
Affected: 3.1.5
Affected: 3.1.0
Affected: 3.0.1
Affected: 3.0.2
Affected: 2.3.1
Affected: 2.3.2
Affected: 2.3.3
Affected: 2.3.5
Affected: 2.2.1
Affected: 2.2.2
Affected: 2.0.0
Affected: 4.11.1
Affected: 4.12.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "unified_computing_system",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:unified_computing_system_e-series:4.12.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "unified_computing_system_e-series",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20356",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-25T17:53:52.218954Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:42.092Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:41.754Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-cimc-cmd-inj-bLuPcb",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.0(1c)"
            },
            {
              "status": "affected",
              "version": "3.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.0(3a)"
            },
            {
              "status": "affected",
              "version": "3.0(3b)"
            },
            {
              "status": "affected",
              "version": "3.0(3e)"
            },
            {
              "status": "affected",
              "version": "3.0(4a)"
            },
            {
              "status": "affected",
              "version": "3.0(4d)"
            },
            {
              "status": "affected",
              "version": "3.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.0(4i)"
            },
            {
              "status": "affected",
              "version": "3.0(4j)"
            },
            {
              "status": "affected",
              "version": "3.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.0(4l)"
            },
            {
              "status": "affected",
              "version": "3.0(4m)"
            },
            {
              "status": "affected",
              "version": "3.0(4n)"
            },
            {
              "status": "affected",
              "version": "3.0(4o)"
            },
            {
              "status": "affected",
              "version": "3.0(4p)"
            },
            {
              "status": "affected",
              "version": "3.0(4q)"
            },
            {
              "status": "affected",
              "version": "3.0(4r)"
            },
            {
              "status": "affected",
              "version": "3.0(4s)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "4.0(2k)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "4.0(2m)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.0(4j)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            }
          ]
        },
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-24T19:40:33.312Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-cmd-inj-bLuPcb",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-cmd-inj-bLuPcb",
        "defects": [
          "CSCwi43005",
          "CSCwj41082",
          "CSCwi43001",
          "CSCwi42996"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20356",
    "datePublished": "2024-04-24T19:40:33.312Z",
    "dateReserved": "2023-11-08T15:08:07.648Z",
    "dateUpdated": "2024-08-01T21:59:41.754Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en la interfaz de administraci\\u00f3n basada en web de Cisco Integrated Management Controller (IMC) podr\\u00eda permitir que un atacante remoto autenticado con privilegios de nivel de administrador realice ataques de inyecci\\u00f3n de comandos en un sistema afectado y eleve sus privilegios a root. Esta vulnerabilidad se debe a una validaci\\u00f3n insuficiente de la entrada del usuario. Un atacante podr\\u00eda aprovechar esta vulnerabilidad enviando comandos manipulados a la interfaz de administraci\\u00f3n basada en web del software afectado. Un exploit exitoso podr\\u00eda permitir al atacante elevar sus privilegios a root.\"}]",
      "id": "CVE-2024-20356",
      "lastModified": "2024-11-21T08:52:26.907",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 5.8}]}",
      "published": "2024-04-24T20:15:07.477",
      "references": "[{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-20356\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2024-04-24T20:15:07.477\",\"lastModified\":\"2024-11-21T08:52:26.907\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Integrated Management Controller (IMC) podr\u00eda permitir que un atacante remoto autenticado con privilegios de nivel de administrador realice ataques de inyecci\u00f3n de comandos en un sistema afectado y eleve sus privilegios a root. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada del usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando comandos manipulados a la interfaz de administraci\u00f3n basada en web del software afectado. Un exploit exitoso podr\u00eda permitir al atacante elevar sus privilegios a root.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb\", \"name\": \"cisco-sa-cimc-cmd-inj-bLuPcb\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T21:59:41.754Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-20356\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-25T17:53:52.218954Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"unified_computing_system\", \"versions\": [{\"status\": \"affected\", \"version\": \"-\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:cisco:unified_computing_system_e-series:4.12.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"unified_computing_system_e-series\", \"versions\": [{\"status\": \"affected\", \"version\": \"-\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-04-25T18:02:48.970Z\"}}], \"cna\": {\"source\": {\"defects\": [\"CSCwi43005\", \"CSCwj41082\", \"CSCwi43001\", \"CSCwi42996\"], \"advisory\": \"cisco-sa-cimc-cmd-inj-bLuPcb\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Unified Computing System (Standalone)\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0(1c)\"}, {\"status\": \"affected\", \"version\": \"3.0(1d)\"}, {\"status\": \"affected\", \"version\": \"3.0(3a)\"}, {\"status\": \"affected\", \"version\": \"3.0(3b)\"}, {\"status\": \"affected\", \"version\": \"3.0(3e)\"}, {\"status\": \"affected\", \"version\": \"3.0(4a)\"}, {\"status\": \"affected\", \"version\": \"3.0(4d)\"}, {\"status\": \"affected\", \"version\": \"3.0(4e)\"}, {\"status\": \"affected\", \"version\": \"3.0(4i)\"}, {\"status\": \"affected\", \"version\": \"3.0(4j)\"}, {\"status\": \"affected\", \"version\": \"3.0(4k)\"}, {\"status\": \"affected\", \"version\": \"3.0(4l)\"}, {\"status\": \"affected\", \"version\": \"3.0(4m)\"}, {\"status\": \"affected\", \"version\": \"3.0(4n)\"}, {\"status\": \"affected\", \"version\": \"3.0(4o)\"}, {\"status\": \"affected\", \"version\": \"3.0(4p)\"}, {\"status\": \"affected\", \"version\": \"3.0(4q)\"}, {\"status\": \"affected\", \"version\": \"3.0(4r)\"}, {\"status\": \"affected\", \"version\": \"3.0(4s)\"}, {\"status\": \"affected\", \"version\": \"3.1(1d)\"}, {\"status\": \"affected\", \"version\": \"3.1(2b)\"}, {\"status\": \"affected\", \"version\": \"3.1(2c)\"}, {\"status\": \"affected\", \"version\": \"3.1(2d)\"}, {\"status\": \"affected\", \"version\": \"3.1(2e)\"}, {\"status\": \"affected\", \"version\": \"3.1(2g)\"}, {\"status\": \"affected\", \"version\": \"3.1(2i)\"}, {\"status\": \"affected\", \"version\": \"3.1(3a)\"}, {\"status\": \"affected\", \"version\": \"3.1(3b)\"}, {\"status\": \"affected\", \"version\": \"3.1(3c)\"}, {\"status\": \"affected\", \"version\": \"3.1(3d)\"}, {\"status\": \"affected\", \"version\": \"3.1(3g)\"}, {\"status\": \"affected\", \"version\": \"3.1(3h)\"}, {\"status\": \"affected\", \"version\": \"3.1(3i)\"}, {\"status\": \"affected\", \"version\": \"3.1(3j)\"}, {\"status\": \"affected\", \"version\": \"3.1(3k)\"}, {\"status\": \"affected\", \"version\": \"4.0(1.240)\"}, {\"status\": \"affected\", \"version\": \"4.0(1a)\"}, {\"status\": \"affected\", \"version\": \"4.0(1b)\"}, {\"status\": \"affected\", \"version\": \"4.0(1c)\"}, {\"status\": \"affected\", \"version\": \"4.0(1d)\"}, {\"status\": \"affected\", \"version\": \"4.0(1e)\"}, {\"status\": \"affected\", \"version\": \"4.0(1g)\"}, {\"status\": \"affected\", \"version\": \"4.0(1h)\"}, {\"status\": \"affected\", \"version\": \"4.0(2c)\"}, {\"status\": \"affected\", \"version\": \"4.0(2d)\"}, {\"status\": \"affected\", \"version\": \"4.0(2f)\"}, {\"status\": \"affected\", \"version\": \"4.0(2g)\"}, {\"status\": \"affected\", \"version\": \"4.0(2h)\"}, {\"status\": \"affected\", \"version\": \"4.0(2i)\"}, {\"status\": \"affected\", \"version\": \"4.0(2k)\"}, {\"status\": \"affected\", \"version\": \"4.0(2l)\"}, {\"status\": \"affected\", \"version\": \"4.0(2m)\"}, {\"status\": \"affected\", \"version\": \"4.0(2n)\"}, {\"status\": \"affected\", \"version\": \"4.0(4b)\"}, {\"status\": \"affected\", \"version\": \"4.0(4c)\"}, {\"status\": \"affected\", \"version\": \"4.0(4d)\"}, {\"status\": \"affected\", \"version\": \"4.0(4e)\"}, {\"status\": \"affected\", \"version\": \"4.0(4f)\"}, {\"status\": \"affected\", \"version\": \"4.0(4h)\"}, {\"status\": \"affected\", \"version\": \"4.0(4i)\"}, {\"status\": \"affected\", \"version\": \"4.0(4j)\"}, {\"status\": \"affected\", \"version\": \"4.0(4k)\"}, {\"status\": \"affected\", \"version\": \"4.0(4l)\"}, {\"status\": \"affected\", \"version\": \"4.0(4m)\"}, {\"status\": \"affected\", \"version\": \"4.0(2o)\"}, {\"status\": \"affected\", \"version\": \"4.0(2p)\"}, {\"status\": \"affected\", \"version\": \"4.0(4n)\"}, {\"status\": \"affected\", \"version\": \"4.0(2q)\"}, {\"status\": \"affected\", \"version\": \"4.0(2r)\"}, {\"status\": \"affected\", \"version\": \"4.1(1c)\"}, {\"status\": \"affected\", \"version\": \"4.1(1d)\"}, {\"status\": \"affected\", \"version\": \"4.1(1f)\"}, {\"status\": \"affected\", \"version\": \"4.1(1g)\"}, {\"status\": \"affected\", \"version\": \"4.1(2a)\"}, {\"status\": \"affected\", \"version\": \"4.1(1h)\"}, {\"status\": \"affected\", \"version\": \"4.1(2b)\"}, {\"status\": \"affected\", \"version\": \"4.1(2f)\"}, {\"status\": \"affected\", \"version\": \"4.1(2e)\"}, {\"status\": \"affected\", \"version\": \"4.1(3b)\"}, {\"status\": \"affected\", \"version\": \"4.1(2d)\"}, {\"status\": \"affected\", \"version\": \"4.1(3c)\"}, {\"status\": \"affected\", \"version\": \"4.1(3d)\"}, {\"status\": \"affected\", \"version\": \"4.1(2g)\"}, {\"status\": \"affected\", \"version\": \"4.1(3f)\"}, {\"status\": \"affected\", \"version\": \"4.1(2h)\"}, {\"status\": \"affected\", \"version\": \"4.1(2j)\"}, {\"status\": \"affected\", \"version\": \"4.1(2k)\"}, {\"status\": \"affected\", \"version\": \"4.1(2l)\"}, {\"status\": \"affected\", \"version\": \"4.1(3g)\"}, {\"status\": \"affected\", \"version\": \"4.1(3h)\"}, {\"status\": \"affected\", \"version\": \"4.1(3i)\"}, {\"status\": \"affected\", \"version\": \"4.1(3l)\"}, {\"status\": \"affected\", \"version\": \"4.1(2m)\"}, {\"status\": \"affected\", \"version\": \"4.1(3m)\"}, {\"status\": \"affected\", \"version\": \"4.2(1a)\"}, {\"status\": \"affected\", \"version\": \"4.2(1b)\"}, {\"status\": \"affected\", \"version\": \"4.2(1c)\"}, {\"status\": \"affected\", \"version\": \"4.2(1e)\"}, {\"status\": \"affected\", \"version\": \"4.2(1f)\"}, {\"status\": \"affected\", \"version\": \"4.2(1g)\"}, {\"status\": \"affected\", \"version\": \"4.2(1i)\"}, {\"status\": \"affected\", \"version\": \"4.2(1j)\"}, {\"status\": \"affected\", \"version\": \"4.2(2a)\"}, {\"status\": \"affected\", \"version\": \"4.2(2f)\"}, {\"status\": \"affected\", \"version\": \"4.2(2g)\"}, {\"status\": \"affected\", \"version\": \"4.2(3b)\"}, {\"status\": \"affected\", \"version\": \"4.2(3d)\"}, {\"status\": \"affected\", \"version\": \"4.2(3e)\"}, {\"status\": \"affected\", \"version\": \"4.2(3g)\"}, {\"status\": \"affected\", \"version\": \"4.2(3h)\"}, {\"status\": \"affected\", \"version\": \"4.2(3i)\"}, {\"status\": \"affected\", \"version\": \"4.2(3j)\"}, {\"status\": \"affected\", \"version\": \"4.3(1.230097)\"}, {\"status\": \"affected\", \"version\": \"4.3(1.230124)\"}, {\"status\": \"affected\", \"version\": \"4.3(1.230138)\"}, {\"status\": \"affected\", \"version\": \"4.3(2.230207)\"}, {\"status\": \"affected\", \"version\": \"4.3(2.230270)\"}, {\"status\": \"affected\", \"version\": \"4.3(2.240002)\"}, {\"status\": \"affected\", \"version\": \"4.3(3.240022)\"}]}, {\"vendor\": \"Cisco\", \"product\": \"Cisco Unified Computing System E-Series Software (UCSE)\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.1.0\"}, {\"status\": \"affected\", \"version\": \"2.4.0\"}, {\"status\": \"affected\", \"version\": \"2.4.1\"}, {\"status\": \"affected\", \"version\": \"2.4.2\"}, {\"status\": \"affected\", \"version\": \"3.2.1\"}, {\"status\": \"affected\", \"version\": \"3.2.2\"}, {\"status\": \"affected\", \"version\": \"3.2.3\"}, {\"status\": \"affected\", \"version\": \"3.2.4\"}, {\"status\": \"affected\", \"version\": \"3.2.6\"}, {\"status\": \"affected\", \"version\": \"3.2.7\"}, {\"status\": \"affected\", \"version\": \"3.2.10\"}, {\"status\": \"affected\", \"version\": \"3.2.11.1\"}, {\"status\": \"affected\", \"version\": \"3.2.8\"}, {\"status\": \"affected\", \"version\": \"3.2.11.3\"}, {\"status\": \"affected\", \"version\": \"3.2.11.5\"}, {\"status\": \"affected\", \"version\": \"3.2.12.2\"}, {\"status\": \"affected\", \"version\": \"3.2.13.6\"}, {\"status\": \"affected\", \"version\": \"3.2.14\"}, {\"status\": \"affected\", \"version\": \"3.2.15\"}, {\"status\": \"affected\", \"version\": \"3.1.1\"}, {\"status\": \"affected\", \"version\": \"3.1.2\"}, {\"status\": \"affected\", \"version\": \"3.1.3\"}, {\"status\": \"affected\", \"version\": \"3.1.4\"}, {\"status\": \"affected\", \"version\": \"3.1.5\"}, {\"status\": \"affected\", \"version\": \"3.1.0\"}, {\"status\": \"affected\", \"version\": \"3.0.1\"}, {\"status\": \"affected\", \"version\": \"3.0.2\"}, {\"status\": \"affected\", \"version\": \"2.3.1\"}, {\"status\": \"affected\", \"version\": \"2.3.2\"}, {\"status\": \"affected\", \"version\": \"2.3.3\"}, {\"status\": \"affected\", \"version\": \"2.3.5\"}, {\"status\": \"affected\", \"version\": \"2.2.1\"}, {\"status\": \"affected\", \"version\": \"2.2.2\"}, {\"status\": \"affected\", \"version\": \"2.0.0\"}, {\"status\": \"affected\", \"version\": \"4.11.1\"}, {\"status\": \"affected\", \"version\": \"4.12.1\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\\r\\n\\r\\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory.\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb\", \"name\": \"cisco-sa-cimc-cmd-inj-bLuPcb\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"cwe\", \"cweId\": \"CWE-78\", \"description\": \"Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-04-24T19:40:33.312Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-20356\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T21:59:41.754Z\", \"dateReserved\": \"2023-11-08T15:08:07.648Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2024-04-24T19:40:33.312Z\", \"assignerShortName\": \"cisco\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…