Multiple critical security vulnerabilities in Cisco allow attackers to execute arbitrary commands with user consent. The vulnerability affects Cisco FXOS Software, Cisco NX-OS Software, and Cisco UCS Manager Software.
A vulnerability in CLI of Cisco FXOS Software and Cisco UCS Manager Software allows an authenticated local attacker to execute arbitrary commands on the user device.
The vulnerability is due to lack of input validation, successful exploitation allows the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in.
Cisco released security updates to address this vulnerability as a part of the February 2020 Cisco FXOS and NX-OS Software Security Advisory.
The vulnerability resides n the CLI of Cisco FXOS Software and Cisco UCS Manager Software that would allow an authenticated, local attacker to execute arbitrary commands.
An attacker could exploit this vulnerability by sending crafted arguments to specific commands, successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user.
Cisco released security updates to address this vulnerability as a part of the February 2020 Cisco FXOS and NX-OS Software Security Advisory.
The vulnerability allows an unauthenticated, adjacent attacker to execute arbitrary code as root or to cause a denial of service (DoS) condition.
“A successful exploit could allow the attacker to cause a buffer overflow that could allow the attacker to execute arbitrary code as root or cause a DoS condition on the affected device.”
Cisco released security updates to address this vulnerability as a part of the February 2020 Cisco FXOS and NX-OS Software Security Advisory.
Read More:
Cisco Webex Flaw Let Unauthenticated Remote Attackers to Join Private Meetings Without Password
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch"…
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based…
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central…
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India,…
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection…
Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new report…