First published: Thu Jun 18 2020(Updated: )
A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker could exploit this vulnerability by creating a task with specific configuration parameters. A successful exploit could allow the attacker to overwrite arbitrary files in the file system of an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director | <6.7.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3241 is a vulnerability in the orchestration tasks of Cisco UCS Director that could allow an authenticated remote attacker to perform a path traversal attack on an affected device.
The severity of CVE-2020-3241 is high, with a CVSS score of 6.5.
CVE-2020-3241 affects Cisco UCS Director versions up to and excluding 6.7.4.0.
The Common Vulnerabilities and Exposures (CVE) ID for this vulnerability is CVE-2020-3241.
Yes, Cisco has provided a security advisory with mitigation details for CVE-2020-3241. Please refer to the reference link for more information.