Логотип exploitDog
bind:CVE-2024-20295
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20295

Количество 3

Количество 3

nvd логотип

CVE-2024-20295

почти 2 года назад

A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-384c-8455-8xjm

почти 2 года назад

A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2024-03057

почти 2 года назад

Уязвимость интерфейса командной строки программного средства удалённого администрирования серверов Cisco Integrated Management Controller, позволяющая нарушителю выполнить произвольные команды в базовой операционной системе и повысить свои привилегии до уровня root-пользователя

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20295

A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-384c-8455-8xjm

A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-03057

Уязвимость интерфейса командной строки программного средства удалённого администрирования серверов Cisco Integrated Management Controller, позволяющая нарушителю выполнить произвольные команды в базовой операционной системе и повысить свои привилегии до уровня root-пользователя

CVSS3: 8.8
0%
Низкий
почти 2 года назад

Уязвимостей на страницу