Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.3
Red Hat Satellite BMC interface vulnerable to remote code execution
CVE-2026-0980
GHSA-hfcp-477w-3wjw
GHSA-hfcp-477w-3wjw
Summary
The BMC interface in Red Hat Satellite is vulnerable to a security risk. An attacker with certain permissions can use a malicious username to execute arbitrary code on the system. Update the affected software to fix this vulnerability.
What to do
- Update corey osman rubyipmi to version 0.13.0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| corey osman | rubyipmi | <= 0.13.0 | 0.13.0 |
| redhat | satellite | 6.0 | – |
| logicminds | rubyipmi | <= 0.12.1 | – |
Original title
rubyipmi is vulnerable to OS Command Injection through malicious usernames
Original description
A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.
nvd CVSS3.1
8.8
Vulnerability type
CWE-78
OS Command Injection
- https://nvd.nist.gov/vuln/detail/CVE-2026-0980
- https://github.com/logicminds/rubyipmi/commit/252503a7b4dca68388165883b0322024e3...
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyipmi/CVE-2026-0...
- https://github.com/advisories/GHSA-hfcp-477w-3wjw
- https://access.redhat.com/security/cve/CVE-2026-0980 Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2429874 Issue Tracking Vendor Advisory
- https://github.com/logicminds/rubyipmi Product
Published: 27 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026