A vulnerability in the fabric interconnect of Cisco Unified Computing System could allow an authenticated, local malicious user to cause a denial of service (DoS) condition. The vulnerability is due to improper filtering of user-supplied parameters. An attacker could exploit this vulnerability by executing certain commands with specific parameters. A successful exploit could allow the malicious user to write directly to hardware components, causing a DoS condition on the system. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker must have local access to a targeted device which may reside on trusted, internal networks behind firewall restrictions. These access requirements decrease the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco unified computing system - |