Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability
TL;DR 📌
A stored cross-site scripting (XSS) vulnerability has been identified in Cisco UCS Manager Software, allowing authenticated attackers to inject malicious scripts. This could lead to unauthorized access to sensitive information. The highest CVSS score is 5.4, indicating a medium severity risk. No workarounds are available, but Cisco has released fixed software versions.
What happened 🕵️♂️
A vulnerability in the web-based management interface of Cisco UCS Manager Software allows an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack. This vulnerability arises from insufficient validation of user-supplied input, enabling attackers to inject malicious data into specific pages. Successful exploitation could allow attackers to execute arbitrary scripts or access sensitive browser-based information. To exploit this vulnerability, the attacker must hold an Administrator or AAA Administrator role.
Affected products 🖥️
The following Cisco products are affected if they are running Cisco UCS Manager Software:
- UCS 6300 Series Fabric Interconnects
- UCS 6400 Series Fabric Interconnects
- UCS 6500 Series Fabric Interconnects
- UCS X-Series Direct Fabric Interconnect 9108 100G
Fixed software 🔧
Upgrade to the first fixed release in your train (or later):
| Release / Product | First Fixed Release | Notes |
|---|---|---|
| 4.1 and earlier | Migrate to a fixed release. | |
| 4.2 | 4.2(3p) | |
| 4.3 | 4.3(6a) | |
| 6.0 | Not vulnerable. | |
| 1.0 | Initial public release. | |
| Cisco UCS Software | 4.2(3p) | 4.1 and earlier |
| Cisco UCS Software | 4.3(6a) | 4.3 |
Workarounds 🧯
There are no workarounds available to address this vulnerability.
Risk in context 🎯
With a CVSS score of 5.4, this vulnerability is rated as medium severity. The risk is primarily driven by the requirement for authenticated access, limiting exposure to users with Administrator roles. However, the potential for sensitive information exposure remains a concern. Organizations should prioritize patching to mitigate this risk.
Fast facts ⚡
- Vulnerability Type: Stored Cross-Site Scripting (XSS)
- CVSS Score: 5.4 (Medium)
- Exploitation: Requires authenticated access (Administrator role)
- Workarounds: None available
- Fixed Software: Available for specific releases
For leadership 🧭
This vulnerability presents a medium risk to our organization, given its CVSS score of 5.4. The exposure is limited to authenticated users with Administrator roles, which reduces the likelihood of exploitation but does not eliminate it. Immediate remediation is necessary, with a recommendation to patch within 7 days, as no workarounds exist.
Operational impact is expected to be minimal, with a brief maintenance window required for the updates, and no configuration drift anticipated.
Now: Review affected systems and prepare for patching.
Next: Implement the necessary software updates.
Later: Monitor for any unusual activity related to this vulnerability.