CVE-2020-3250

Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:ucs_director:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director:6.7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ucs_director_express_for_big_data:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html -
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-20-538/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-20-538/ - Third Party Advisory, VDB Entry

Information

Published : 2020-04-15 21:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3250

Mitre link : CVE-2020-3250

CVE.ORG link : CVE-2020-3250


JSON object : View

Products Affected

cisco

  • ucs_director
  • ucs_director_express_for_big_data
CWE
CWE-20

Improper Input Validation

CWE-269

Improper Privilege Management