CVE-2021-1592
Cisco UCS Manager Software SSH Sessions Denial of Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the way Cisco UCS Manager software handles SSH sessions could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management for established SSH sessions. An attacker could exploit this vulnerability by opening a significant number of SSH sessions on an affected device. A successful exploit could allow the attacker to cause a crash and restart of internal Cisco UCS Manager software processes and a temporary loss of access to the Cisco UCS Manager CLI and web UI. Note: The attacker must have valid user credentials to authenticate to the affected device.
Una vulnerabilidad en la forma en que el software Cisco UCS Manager maneja las sesiones SSH podría permitir a un atacante remoto autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad es debido a un manejo inapropiado de los recursos para las sesiones SSH establecidas. Un atacante podría explotar esta vulnerabilidad al abrir un número significativo de sesiones SSH en un dispositivo afectado. Una explotación con éxito podría permitir al atacante causar un bloqueo y reinicio de los procesos internos del software Cisco UCS Manager y una pérdida temporal de acceso a la CLI y la UI web de Cisco UCS Manager. Nota: El atacante debe tener credenciales de usuario válidas para autenticarse en el dispositivo afectado.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2020-11-13 CVE Reserved
- 2021-08-25 CVE Published
- 2023-03-18 EPSS Updated
- 2024-11-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-664: Improper Control of a Resource Through its Lifetime
- CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-dos-MgvmyrQy | 2023-11-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Unified Computing System Search vendor "Cisco" for product "Unified Computing System" | >= 4.0 < 4.0\(4m\) Search vendor "Cisco" for product "Unified Computing System" and version " >= 4.0 < 4.0\(4m\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Unified Computing System 64108 Search vendor "Cisco" for product "Unified Computing System 64108" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Unified Computing System Search vendor "Cisco" for product "Unified Computing System" | >= 4.0 < 4.0\(4m\) Search vendor "Cisco" for product "Unified Computing System" and version " >= 4.0 < 4.0\(4m\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Unified Computing System 6454 Search vendor "Cisco" for product "Unified Computing System 6454" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Unified Computing System Search vendor "Cisco" for product "Unified Computing System" | >= 4.1 < 4.1\(3e\) Search vendor "Cisco" for product "Unified Computing System" and version " >= 4.1 < 4.1\(3e\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Unified Computing System 64108 Search vendor "Cisco" for product "Unified Computing System 64108" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Unified Computing System Search vendor "Cisco" for product "Unified Computing System" | >= 4.1 < 4.1\(3e\) Search vendor "Cisco" for product "Unified Computing System" and version " >= 4.1 < 4.1\(3e\)" | - |
Affected
| in | Cisco Search vendor "Cisco" | Unified Computing System 6454 Search vendor "Cisco" for product "Unified Computing System 6454" | - | - |
Safe
|