Cisco System Inc, an American multinational corporation, has released an advisory to address remote code execution vulnerability in its Unified Computing System (UCS) Central software, a networking giant which integrates processing, networking and storage into one system.
The company said that it could exploit by remote attackers to execute arbitrary commands on affected systems.
“Successful exploitation of the vulnerability may permit unauthenticated access to sensitive information, allow arbitrary command execution on the Cisco UCS Central operating system or impact the availability of the affected device,” Cisco wrote in its advisory on May 6.
“An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device," said the advisory. An exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the root user.”
According to the advisory, the vulnerability was caused by the improper input validation (CVE-2015-0701) which allows an unauthenticated remote attacker to execute arbitrary commands on the underlying operating system with root privileges.
However, the company has failed to validate user input via its web framework, exposing the platform to remote attack in versions 1.2.
The company added that it is not aware of any public exploits as it hasn’t found any evidence to prove it.
The advisory said that the users can fix the vulnerability by updating the software which is provided by Cisco.
The company has urged its users to update to UCS Central software version 1.3. It has assigned the vulnerability its highest severity score of 10.
Earlier, Cisco released security updates for several of its products. Like Cisco Adaptive Security Appliance (ASA), Cisco Small Business SPA300 and SPA500 series IP phones, and IOS software.