Fixing Privilege Escalation Vulnerability in Cisco IMC

The company Cisco has released patches for a vulnerability in the Integrated Management Controller (IMC) for which a publicly available exploit exists. The issue allows local malicious actors to elevate their privileges to root level.

Cisco IMC is a Baseboard Management Controller (BMC) for managing UCS C-Series Rack and UCS S-Series Storage servers through various interfaces, including XML API, a web interface, and CLI.

The company explains that the vulnerability has been assigned identifier CVE-2024-20295 and allows an authenticated local malicious actor to execute command injections at the base OS level, escalating their privileges to root. The vulnerability is related to improper validation of user input data and can be exploited using specially crafted CLI commands.

“To exploit this vulnerability, an attacker must have read-only or higher rights on the affected device,” Cisco writes.

The vulnerability affects the following Cisco devices with vulnerable IMC versions in default configurations:

  • Enterprise Network Compute Systems (ENCS) 5000 series;
  • Catalyst 8300 series Edge uCPE;
  • UCS C-Series Rack servers in standalone mode;
  • UCS E-Series servers.

The Cisco PSIRT team warns that a PoC exploit for this issue is already publicly available, but hackers have not yet started exploiting the vulnerability in attacks.

0 / 5

Your page rank:


Subscribe: YouTube page opens in new windowLinkedin page opens in new windowTelegram page opens in new window

Leave a Reply

Your email address will not be published. Required fields are marked *

Post comment