Cyber Posture

CVE-2026-0980

High

Published: 27 February 2026

Published
27 February 2026
Modified
27 March 2026
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
EPSS Score 0.0010 27.5th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the…

more

BMC interface. This could lead to remote code execution (RCE) on the system.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2026-0980 by identifying, testing, and applying patches to the vulnerable rubyipmi gem as provided in Red Hat security errata.

prevent

Prevents command injection exploitation by enforcing validity checks on malicious username inputs to the BMC interface.

prevent

Reduces the attack surface by restricting host creation or update permissions to the minimum necessary users, limiting who can supply malicious BMC usernames.

Security SummaryAI

CVE-2026-0980 is a command injection vulnerability (CWE-78) in the rubyipmi Ruby gem, which is used within the Baseboard Management Controller (BMC) component of Red Hat Satellite. The flaw allows an attacker to inject malicious commands through specially crafted input. It has a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L), indicating high severity due to its potential for significant confidentiality, integrity, and limited availability impacts.

An authenticated attacker with permissions to create or update hosts in Red Hat Satellite can exploit this vulnerability by supplying a malicious username to the BMC interface. Successful exploitation leads to remote code execution (RCE) on the affected system, potentially allowing the attacker to execute arbitrary commands with the privileges of the Satellite process.

Red Hat has addressed this issue in multiple security errata, including RHSA-2026:5968, RHSA-2026:5970, and RHSA-2026:5971, which provide updated packages for rubyipmi and related components in Red Hat Satellite. Additional details are available in the CVE security advisory at https://access.redhat.com/security/cve/CVE-2026-0980 and the upstream Bugzilla tracker at https://bugzilla.redhat.com/show_bug.cgi?id=2429874. Security practitioners should apply these patches promptly to mitigate the risk.

Details

CWE(s)

Affected Products

redhat
satellite
6.0
logicminds
rubyipmi
≤ 0.12.1

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Command injection (CWE-78) in network-accessible BMC/Satellite component directly enables remote exploitation of a public-facing application (T1190) and arbitrary command execution via the system's command interpreter (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References