A vulnerability in an operations script of Cisco UCS Central could allow an authenticated, remote attacker to execute arbitrary shell commands with the privileges of the daemon user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by posting a crafted request to the user interface of Cisco UCS Central. This vulnerability affects Cisco UCS Central Software prior to Release 2.0(1c). Cisco Bug IDs: CSCve70825.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/102966 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1040337 | Third Party Advisory VDB Entry | 
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucsc | Vendor Advisory | 
| http://www.securityfocus.com/bid/102966 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1040337 | Third Party Advisory VDB Entry | 
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ucsc | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2018-02-08 07:29
Updated : 2024-11-21 03:37
NVD link : CVE-2018-0113
Mitre link : CVE-2018-0113
CVE.ORG link : CVE-2018-0113
JSON object : View
Products Affected
                cisco
- unified_computing_system_central_software
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
