CVE-2020-3470

Multiple vulnerabilities in the API subsystem of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges. The vulnerabilities are due to improper boundary checks for certain user-supplied input. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the API subsystem of an affected system. When this request is processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code with root privileges on the underlying operating system (OS).
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:enterprise_network_compute_system_5100:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:enterprise_network_compute_system_5400:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:c125_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:c220_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:c240_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:c480_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:c480_ml_m5:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:ucs_c220_m4:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_c460_m4:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:ucs_c22_m3:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_c220_m3:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_c24_m3:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_c240_m3:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_c420_m3:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:ucs_e-series_m1:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_e-series_m2:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_e-series_m3:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_s3160:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:31

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-api-rce-UXwpeDHd - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-api-rce-UXwpeDHd - Vendor Advisory

Information

Published : 2020-11-18 19:15

Updated : 2024-11-21 05:31


NVD link : CVE-2020-3470

Mitre link : CVE-2020-3470

CVE.ORG link : CVE-2020-3470


JSON object : View

Products Affected

cisco

  • ucs_c220_m3
  • ucs_s3160
  • ucs_c240_m3
  • ucs_e-series_m3
  • ucs_s3260
  • integrated_management_controller
  • ucs_c22_m3
  • c125_m5
  • enterprise_nfv_infrastructure_software
  • c220_m5
  • ucs_e-series_m1
  • ucs_c420_m3
  • ucs_e-series_m2
  • enterprise_network_compute_system_5100
  • ucs_c24_m3
  • enterprise_network_compute_system_5400
  • c480_m5
  • c240_m5
  • ucs_c460_m4
  • c480_ml_m5
  • ucs_c220_m4
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-20

Improper Input Validation