Lucene search

K
ciscoCiscoCISCO-SA-UCSFI-IMM-SYN-P6KZTDQC
HistoryFeb 28, 2024 - 4:00 p.m.

Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability

2024-02-2816:00:00
tools.cisco.com
16
cisco
ucs
fabric interconnects
intersight
managed mode
denial of service
vulnerability
unauthenticated
remote attacker
tcp connections
device console ui
crash
software updates
advisory

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability in system resource management in Cisco UCS 6400 and 6500 Series Fabric Interconnects that are in Intersight Managed Mode (IMM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the Device Console UI of an affected device.

This vulnerability is due to insufficient rate-limiting of TCP connections to an affected device. An attacker could exploit this vulnerability by sending a high number of TCP packets to the Device Console UI. A successful exploit could allow an attacker to cause the Device Console UI process to crash, resulting in a DoS condition. A manual reload of the fabric interconnect is needed to restore complete functionality.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsfi-imm-syn-p6kZTDQC [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsfi-imm-syn-p6kZTDQC”]

Affected configurations

Vulners
Node
ciscounified_computing_system_directorMatchany
OR
ciscounified_computing_system_directorMatchany

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CISCO-SA-UCSFI-IMM-SYN-P6KZTDQC