-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Cisco Security Advisory: Cisco UCS Central Software Arbitrary Command Execution Vulnerability Advisory ID: cisco-sa-20150506-ucsc Revision 1.0 For Public Release 2015 May 6 16:00 UTC (GMT) +---------------------------------------------------------------------- Summary ======= A vulnerability in the web framework of Cisco UCS Central Software could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the root user. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150506-ucsc -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJVSj5OAAoJEIpI1I6i1Mx3NrsP/3Vq90MyAY+s8w79FLg9siay R6nCHhXXUdFPuqbRy99a7RgujHC2g/Nx9lQ19q5PU+Oagprv/RDvkRH8ThPqsFPT V4R5qXoHgz8uZ9hwckmubGaUstBv14VrqbWCxUV9BkeGgYFOM4WlCfTh3zlzoFHU ElGln4ZnQdEYdhc7vn4uqmQh7ToWg7iboKOI+XHGB1dSRJHsJUtXQog5TfQrrx0l oT8UuYM50mp+CWpC+IXuUrPsk8da0hmO/seNnendSSVS8fc1YL8hncFnWbC8plj7 YfJMSitbjl5DZdEYME0+xAV/4cBHj8yegF5bl1mYektv11GsLIWWPGm5Q4FCljwN gjTO9A4s3qtYj+HgHCLKo6GOvygx/NGgC9saVRUsfgAi4+TkT03clMCHrqUCfj29 hhHppfj0oOlFXOcN4DnzI9lJavSWpljRZncUo5NBLhN0t1Iw22qJCG9IVjs1fscb 3hm2yPI3lTHtFbA+4slxDuaSJFJulqU9BThtuAqe7RE1uG+za0g2vKViCOWAID6Z h+8cj+HwR6GlVEj0fNetZDgli9FofwunrJG36XfX/aS8hx/Wj5bXbcJ4A10pXsKH yrp5z60+hu011pN/rVhZueke4oD7oVDG/HkKkkqc1UHX8L3OoV4oxY9HR7sgKIox 6MDNRg/zvOAe7eAaoocD =8KjF -----END PGP SIGNATURE-----