First published: Wed Apr 15 2020(Updated: )
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director | =6.0.0.0 | |
Cisco UCS Director | =6.0.0.1 | |
Cisco UCS Director | =6.0.1.0 | |
Cisco UCS Director | =6.0.1.1 | |
Cisco UCS Director | =6.0.1.2 | |
Cisco UCS Director | =6.0.1.3 | |
Cisco UCS Director | =6.5.0.0 | |
Cisco UCS Director | =6.5.0.1 | |
Cisco UCS Director | =6.5.0.2 | |
Cisco UCS Director | =6.5.0.3 | |
Cisco UCS Director | =6.5.0.4 | |
Cisco UCS Director | =6.6.0.0 | |
Cisco UCS Director | =6.6.1.0 | |
Cisco UCS Director | =6.6.2.0 | |
Cisco UCS Director | =6.7.0.0 | |
Cisco UCS Director | =6.7.1.0 | |
Cisco UCS Director | =6.7.2.0 | |
Cisco UCS Director | =6.7.3.0 | |
Cisco UCS Director Express for Big Data | <=3.7.3.0 | |
Cisco UCS Director |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3248 is a vulnerability in Cisco UCS Director that allows remote attackers to execute arbitrary code on affected installations.
No, authentication is not required to exploit CVE-2020-3248.
CVE-2020-3248 has a severity rating of 9.8 (Critical).
The affected software includes Cisco UCS Director versions 6.0.0.0 to 6.7.3.0 and Cisco UCS Director Express for Big Data version 3.7.3.0.
It is recommended to apply the necessary updates provided by Cisco to fix CVE-2020-3248.