CVE-2026-0980

Source
https://cve.org/CVERecord?id=CVE-2026-0980
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-0980.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-0980
Aliases
Downstream
Published
2026-02-27T07:30:42.657Z
Modified
2026-05-15T12:05:43.107026831Z
Severity
  • 8.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L CVSS Calculator
Summary
Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username
Details

A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.

Database specific
{
    "cwe_ids": [
        "CWE-78"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/0xxx/CVE-2026-0980.json",
    "cna_assigner": "redhat"
}
References

Affected packages