6.8
CVSSv2

CVE-2012-4112

Published: 19/10/2013 Updated: 21/10/2013
CVSS v2 Base Score: 6.8 | Impact Score: 10 | Exploitability Score: 3.1
VMScore: 605
Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the Baseboard Management Controller (BMC) of the Cisco Unified Computing System could allow an authenticated, local malicious user to inject arbitrary commands on the underlying operating system with elevated privileges. The vulnerability is due to improper filtering of user-supplied parameters. An attacker could exploit this vulnerability by providing invalid parameters to certain command-line interface (CLI) commands. An exploit could allow the malicious user to execute arbitrary commands or obtain an interactive shell with elevated privileges. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker must have local access to a targeted device, which may reside on trusted, internal networks behind firewall restrictions. These access requirements decrease the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco unified computing system -

Vendor Advisories

A vulnerability in the Baseboard Management Controller (BMC) of the Cisco Unified Computing System could allow an authenticated, local attacker to inject arbitrary commands on the underlying operating system with elevated privileges The vulnerability is due to improper filtering of user-supplied parameters An attacker could exploit this vulnerab ...