Learn about CVE-2019-1885, a vulnerability in Cisco Integrated Management Controller allowing remote attackers to execute unauthorized commands with root privileges. Find mitigation steps here.
A vulnerability in the Redfish protocol of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device.
Understanding CVE-2019-1885
What is CVE-2019-1885?
A flaw in the Redfish protocol used by the Cisco Integrated Management Controller (IMC) allows an authenticated remote attacker to inject and execute unauthorized commands with root privileges on a targeted device.
The Impact of CVE-2019-1885
The vulnerability could lead to an attacker injecting and executing unauthorized commands on the affected device with root privileges.
Technical Details of CVE-2019-1885
Vulnerability Description
Insufficient validation of user-supplied input in the Redfish protocol of Cisco IMC leads to command injection vulnerability.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates