Cisco Security Advisory 2024年07月05日
Cisco Integrated Management Controller CLI Command Injection Vulnerability
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Cisco 集成管理控制器 (IMC) 的 CLI 中存在一个漏洞,可能允许经过身份验证的本地攻击者对底层操作系统执行命令注入攻击,并将权限提升至 root。攻击者必须在受影响的设备上拥有只读或更高权限才能利用此漏洞。

😨 **漏洞概述:** 该漏洞源于对用户提供输入的验证不足。攻击者可以通过提交精心制作的 CLI 命令来利用此漏洞。成功利用该漏洞可能允许攻击者将权限提升至 root。

🤔 **漏洞利用条件:** 攻击者需要在受影响的设备上拥有只读或更高的权限才能利用此漏洞。

🤯 **影响:** 成功利用该漏洞可能允许攻击者将权限提升至 root,从而控制受影响的设备。

🛡️ **缓解措施:** Cisco 已发布了修复此漏洞的软件更新。目前没有针对此漏洞的变通方法。用户应尽快更新其设备以缓解此漏洞。

A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. 

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ


Security Impact Rating: High
CVE: CVE-2024-20295

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Cisco IMC CLI 命令注入 漏洞 CVE-2024-20295
相关文章