7.8
CVSSv3

CVE-2016-6402

Published: 18/09/2016 Updated: 30/07/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

UCS Manager and UCS 6200 Fabric Interconnects in Cisco Unified Computing System (UCS) up to and including 3.0(2d) allow local users to obtain OS root access via crafted CLI input, aka Bug ID CSCuz91263.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco unified computing system 2.2\\(1g\\)

cisco unified computing system 2.2\\(1h\\)

cisco unified computing system 2.2\\(3d\\)

cisco unified computing system 2.2\\(3e\\)

cisco unified computing system 3.0\\(1d\\)

cisco unified computing system 3.0\\(1e\\)

cisco unified computing system 2.2\\(1b\\)

cisco unified computing system 2.2\\(1c\\)

cisco unified computing system 2.2\\(1d\\)

cisco unified computing system 2.2\\(2e\\)

cisco unified computing system 2.2\\(3a\\)

cisco unified computing system 2.2\\(4b\\)

cisco unified computing system 2.2\\(4c\\)

cisco unified computing system 2.2_base

cisco unified computing system 2.2\\(2c\\)a

cisco unified computing system 2.2\\(2c\\)

cisco unified computing system 2.2\\(2d\\)

cisco unified computing system 2.2\\(3f\\)

cisco unified computing system 2.2\\(3g\\)

cisco unified computing system 3.0\\(2c\\)

cisco unified computing system 3.0\\(2d\\)

cisco unified computing system 2.2\\(5b\\)a

cisco unified computing system 2.2\\(1e\\)

cisco unified computing system 2.2\\(1f\\)

cisco unified computing system 2.2\\(3b\\)

cisco unified computing system 2.2\\(3c\\)

cisco unified computing system 2.2\\(5a\\)

cisco unified computing system 3.0\\(1c\\)

Vendor Advisories

A vulnerability in the command-line interface (CLI) of the Cisco Unified Computing System (UCS) Manager and UCS 6200 Series Fabric Interconnects could allow an authenticated, local attacker to access the underlying operating system with the privileges of the root user The vulnerability is due to insufficient sanitization of user-supplied input at ...