BMC Server Automation RSCD Agent Weak ACL NSH Arbitrary Command Execution

critical Nessus Plugin ID 91947


The RSCD agent running on the remote host is affected by a remote command execution vulnerability.


The BMC Server Automation RSCD agent running on the remote host is configured in such a manner as to publicly expose an API that can be used for unrestricted command execution. An unauthenticated, remote attacker can exploit this, via the NSH protocol, to execute arbitrary commands.


Update the exports file to restrict access to the interface.

See Also

Plugin Details

Severity: Critical

ID: 91947

File Name: bmc_rscd_nsh_acl_check.nbin

Version: 1.158

Type: remote

Family: Misc.

Published: 7/5/2016

Updated: 3/19/2024

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Unauthenticated system-level access.


Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

Vulnerability Information

CPE: cpe:/a:bmc:bladelogic_server_automation_rscd_agent

Exploited by Nessus: true