CVE-2026-0980
Published: 27 February 2026
Description
A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the…
more
BMC interface. This could lead to remote code execution (RCE) on the system.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2026-0980 by identifying, testing, and applying patches to the vulnerable rubyipmi gem as provided in Red Hat security errata.
Prevents command injection exploitation by enforcing validity checks on malicious username inputs to the BMC interface.
Reduces the attack surface by restricting host creation or update permissions to the minimum necessary users, limiting who can supply malicious BMC usernames.
Security SummaryAI
CVE-2026-0980 is a command injection vulnerability (CWE-78) in the rubyipmi Ruby gem, which is used within the Baseboard Management Controller (BMC) component of Red Hat Satellite. The flaw allows an attacker to inject malicious commands through specially crafted input. It has a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L), indicating high severity due to its potential for significant confidentiality, integrity, and limited availability impacts.
An authenticated attacker with permissions to create or update hosts in Red Hat Satellite can exploit this vulnerability by supplying a malicious username to the BMC interface. Successful exploitation leads to remote code execution (RCE) on the affected system, potentially allowing the attacker to execute arbitrary commands with the privileges of the Satellite process.
Red Hat has addressed this issue in multiple security errata, including RHSA-2026:5968, RHSA-2026:5970, and RHSA-2026:5971, which provide updated packages for rubyipmi and related components in Red Hat Satellite. Additional details are available in the CVE security advisory at https://access.redhat.com/security/cve/CVE-2026-0980 and the upstream Bugzilla tracker at https://bugzilla.redhat.com/show_bug.cgi?id=2429874. Security practitioners should apply these patches promptly to mitigate the risk.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection (CWE-78) in network-accessible BMC/Satellite component directly enables remote exploitation of a public-facing application (T1190) and arbitrary command execution via the system's command interpreter (T1059).