Upcoming Virtual Event: Cloud Security Summit | July 17 - Register Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Cisco Fixes Critical Command Execution Flaw in UCS Central Software

Cisco has released updates to address a serious vulnerability in the Cisco Unified Computing System (UCS) Central software that can be exploited by remote attackers to execute arbitrary commands on affected systems.

Cisco has released updates to address a serious vulnerability in the Cisco Unified Computing System (UCS) Central software that can be exploited by remote attackers to execute arbitrary commands on affected systems.

The Cisco UCS Central software enables organizations to manage multiple Cisco UCS domains across globally distributed data centers. The solution is designed to simplify global operations with a centralized view of inventory, faults, and logs.

According to Cisco, the solution’s web framework is plagued by a security bug caused by improper input validation (CVE-2015-0701). The vulnerability allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges.

“Successful exploitation of the vulnerability may permit unauthenticated access to sensitive information, allow arbitrary command execution on the Cisco UCS Central operating system or impact the availability of the affected device,” Cisco said in its advisory.

The flaw affects Cisco UCS Central software version 1.2 and prior, and it can be exploited by sending specially crafted HTTP requests to a vulnerable device. Cisco has assigned the bug a CVSS score of 10.

Software updates that fix the vulnerability have been made available by Cisco. Customers are advised to update their installations, but Cisco recommends checking the software for feature set compatibility and other issues that might be specific to their environment. Workarounds for mitigating the flaw are not available.

The company says it hasn’t found any evidence to suggest that the security bug has been exploited in the wild.

Over the past months, Cisco released security updates for several of its products. The list includes Cisco Adaptive Security Appliance (ASA), Cisco Small Business SPA300 and SPA500 series IP phones, and IOS software.

Advertisement. Scroll to continue reading.
Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to utilize tools, controls, and design models needed to properly secure cloud environments.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Anirban Sengupta has been named the CTO and SVP of Engineering of cloud networking and security firm Aviatrix.

Axonius has named Nick Degnan as its first Chief Revenue Officer and Rob Casselman as its first Chief Customer Officer.

Craig Boundy has left Experian to join McAfee as President and CEO.

More People On The Move

Expert Insights