6.8
CVSSv2

CVE-2012-4082

Published: 20/09/2013 Updated: 29/08/2017
CVSS v2 Base Score: 6.8 | Impact Score: 10 | Exploitability Score: 3.1
VMScore: 605
Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the Cisco Management Controller of the Cisco Unified Computing System could allow an authenticated, local malicious user to execute commands on the underlying operation system with elevated privileges. The vulnerability is due to improper parameter input validation. An attacker could exploit this vulnerability by providing invalid parameters to the MCTools application from the CLI of a Fabric Interconnect device. A successful exploit could allow the malicious user to inject arbitrary commands to the underlying operating system with elevated privileges. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker must be able to authenticate and have local access to the targeted device. These access requirements limits the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco unified computing system -

Vendor Advisories

A vulnerability in the Cisco Management Controller of the Cisco Unified Computing System could allow an authenticated, local attacker to execute commands on the underlying operation system with elevated privileges The vulnerability is due to improper parameter input validation An attacker could exploit this vulnerability by providing invalid par ...