Home

Description

Multiple vulnerabilities in the CLI and web-based management interface of Cisco UCS Manager Software could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root.   These vulnerabilities are due to insufficient input validation of command arguments supplied by the user. An attacker could exploit these vulnerabilities by authenticating to a device and submitting crafted input to the affected commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of the affected device with root-level privileges.

PUBLISHED Reserved 2024-10-10 | Published 2025-08-27 | Updated 2025-08-28 | Assigner cisco




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unknown

4.0(1a)
affected

4.1(1d)
affected

4.0(4f)
affected

4.0(4c)
affected

4.0(2b)
affected

4.1(2a)
affected

4.0(4a)
affected

4.0(4e)
affected

3.2(3p)
affected

4.0(4h)
affected

3.2(3d)
affected

3.2(3l)
affected

3.2(3o)
affected

4.0(2a)
affected

4.1(1c)
affected

4.0(1b)
affected

3.2(3j)
affected

3.2(2e)
affected

4.1(1e)
affected

4.0(4d)
affected

3.2(1d)
affected

3.2(3i)
affected

4.0(4b)
affected

4.0(2e)
affected

4.1(1a)
affected

3.2(3h)
affected

4.0(4g)
affected

3.2(2c)
affected

3.2(3k)
affected

3.2(3g)
affected

3.2(2b)
affected

4.0(1d)
affected

3.2(3a)
affected

4.0(1c)
affected

3.2(3e)
affected

3.2(2d)
affected

4.0(4i)
affected

3.2(2f)
affected

4.0(2d)
affected

4.1(1b)
affected

3.2(3n)
affected

3.2(3b)
affected

4.1(2b)
affected

4.0(4k)
affected

4.1(3a)
affected

4.1(3b)
affected

4.1(2c)
affected

4.0(4l)
affected

4.1(4a)
affected

4.1(3c)
affected

4.1(3d)
affected

4.2(1c)
affected

4.2(1d)
affected

4.0(4m)
affected

4.1(3e)
affected

4.2(1f)
affected

4.1(3f)
affected

4.2(1i)
affected

4.1(3h)
affected

4.2(1k)
affected

4.2(1l)
affected

4.0(4n)
affected

4.2(1m)
affected

4.1(3i)
affected

4.2(2a)
affected

4.2(1n)
affected

4.1(3j)
affected

4.2(2c)
affected

4.2(2d)
affected

4.2(3b)
affected

4.1(3k)
affected

4.0(4o)
affected

4.2(2e)
affected

4.2(3d)
affected

4.2(3e)
affected

4.2(3g)
affected

4.1(3l)
affected

4.3(2b)
affected

4.2(3h)
affected

4.2(3i)
affected

4.3(2c)
affected

4.1(3m)
affected

4.3(2e)
affected

4.3(3a)
affected

4.2(3j)
affected

4.3(3c)
affected

4.3(4a)
affected

4.2(3k)
affected

4.3(4b)
affected

4.3(4c)
affected

4.2(3l)
affected

4.3(4d)
affected

4.3(2f)
affected

4.2(3m)
affected

4.3(5a)
affected

4.3(4e)
affected

4.1(3n)
affected

4.3(4f)
affected

4.2(3n)
affected

4.3(5c)
affected

4.2(3o)
affected

4.3(5d)
affected

4.3(6a)
affected

4.3(6b)
affected

4.3(5e)
affected

References

sec.cloudapps.cisco.com/...isco-sa-ucs-multi-cmdinj-E4Ukjyrz (cisco-sa-ucs-multi-cmdinj-E4Ukjyrz)

cve.org (CVE-2025-20294)

nvd.nist.gov (CVE-2025-20294)

Download JSON