A vulnerability in the way Cisco UCS Manager software handles SSH sessions could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management for established SSH sessions. An attacker could exploit this vulnerability by opening a significant number of SSH sessions on an affected device. A successful exploit could allow the attacker to cause a crash and restart of internal Cisco UCS Manager software processes and a temporary loss of access to the Cisco UCS Manager CLI and web UI. Note: The attacker must have valid user credentials to authenticate to the affected device.
2021-08-25T20:15:12.070
2024-11-21T05:44:41.907
Modified
CVSSv3.1: 4.3 (MEDIUM)
AV:N/AC:L/Au:S/C:N/I:N/A:P
8.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | unified_computing_system | < 4.0\(4m\) | Yes |
Application | cisco | unified_computing_system | < 4.1\(3e\) | Yes |
Hardware | cisco | unified_computing_system_64108 | - | No |
Hardware | cisco | unified_computing_system_6454 | - | No |