DETECTION OVERVIEW
Risk Factors
Cisco HyperFlex HX hypervisors are not often exposed to the internet, but an unauthenticated attacker with network access to a HyperFlex device can leverage attack tools such as Metasploit modules to exploit this vulnerability. An attacker can gain complete control of a hypervisor within a data center and pivot to attack other systems in an organization.
Category

Operating System (OS) command injection (also known as shell injection) is a web security vulnerability that enables an attacker to run arbitrary, malicious OS commands on a server running vulnerable software or applications. The web-based management interface of Cisco HyperFlex HX software has a vulnerability in how it validates user input. An attacker sends a specially designed HTTP request with a malicious code injection to the victim, which runs the code with root privileges. After compromising the hypervisor, the attacker can compromise other parts of the hosting infrastructure.
Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.
ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response
Visit this resource for more information.
This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.
Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.
Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.
