A vulnerability in the administrative web interface of the Cisco Unified Computing System could allow an authenticated, remote malicious user to create a denial of service (DoS) condition. The vulnerability is due to improper parameter input validation. An attacker could exploit this vulnerability by setting the string value of certain parameters to a value larger than the input buffer. A successful exploit could allow the malicious user to corrupt the parameters values in the administrative web interface causing administrative sessions to be terminated. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker would need to authenticate to a targeted device which may reside on trusted, internal networks in which the attacker would need access to. These access requirements limits the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco unified computing system - |