CVE-2026-0980
Published: 27 February 2026
Summary
CVE-2026-0980 is a high-severity OS Command Injection (CWE-78) vulnerability in Redhat Satellite. Its CVSS base score is 8.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2026-0980 by identifying, testing, and applying patches to the vulnerable rubyipmi gem as provided in Red Hat security errata.
Prevents command injection exploitation by enforcing validity checks on malicious username inputs to the BMC interface.
Reduces the attack surface by restricting host creation or update permissions to the minimum necessary users, limiting who can supply malicious BMC usernames.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection (CWE-78) in network-accessible BMC/Satellite component directly enables remote exploitation of a public-facing application (T1190) and arbitrary command execution via the system's command interpreter (T1059).
NVD Description
A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the…
more
BMC interface. This could lead to remote code execution (RCE) on the system.
Deeper analysisAI
CVE-2026-0980 is a command injection vulnerability (CWE-78) in the rubyipmi Ruby gem, which is used within the Baseboard Management Controller (BMC) component of Red Hat Satellite. The flaw allows an attacker to inject malicious commands through specially crafted input. It has a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L), indicating high severity due to its potential for significant confidentiality, integrity, and limited availability impacts.
An authenticated attacker with permissions to create or update hosts in Red Hat Satellite can exploit this vulnerability by supplying a malicious username to the BMC interface. Successful exploitation leads to remote code execution (RCE) on the affected system, potentially allowing the attacker to execute arbitrary commands with the privileges of the Satellite process.
Red Hat has addressed this issue in multiple security errata, including RHSA-2026:5968, RHSA-2026:5970, and RHSA-2026:5971, which provide updated packages for rubyipmi and related components in Red Hat Satellite. Additional details are available in the CVE security advisory at https://access.redhat.com/security/cve/CVE-2026-0980 and the upstream Bugzilla tracker at https://bugzilla.redhat.com/show_bug.cgi?id=2429874. Security practitioners should apply these patches promptly to mitigate the risk.
Details
- CWE(s)