First published: Wed Apr 15 2020(Updated: )
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director | =6.0.0.0 | |
Cisco UCS Director | =6.0.0.1 | |
Cisco UCS Director | =6.0.1.0 | |
Cisco UCS Director | =6.0.1.1 | |
Cisco UCS Director | =6.0.1.2 | |
Cisco UCS Director | =6.0.1.3 | |
Cisco UCS Director | =6.5.0.0 | |
Cisco UCS Director | =6.5.0.1 | |
Cisco UCS Director | =6.5.0.2 | |
Cisco UCS Director | =6.5.0.3 | |
Cisco UCS Director | =6.5.0.4 | |
Cisco UCS Director | =6.6.0.0 | |
Cisco UCS Director | =6.6.1.0 | |
Cisco UCS Director | =6.6.2.0 | |
Cisco UCS Director | =6.7.0.0 | |
Cisco UCS Director | =6.7.1.0 | |
Cisco UCS Director | =6.7.2.0 | |
Cisco UCS Director | =6.7.3.0 | |
Cisco UCS Director Express for Big Data | <=3.7.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-3251 is critical with a CVSS score of 8.8.
The affected versions of Cisco UCS Director are 6.0.0.0, 6.0.0.1, 6.0.1.0, 6.0.1.1, 6.0.1.2, 6.0.1.3, 6.5.0.0, 6.5.0.1, 6.5.0.2, 6.5.0.3, 6.5.0.4, 6.6.0.0, 6.6.1.0, 6.6.2.0, 6.7.0.0, 6.7.1.0, 6.7.2.0, and 6.7.3.0. The affected version of Cisco UCS Director Express for Big Data is up to and inclusive of 3.7.3.0.
The vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data for CVE-2020-3251 allow a remote attacker to bypass authentication or conduct directory traversal attacks.
A remote attacker can exploit CVE-2020-3251 by bypassing authentication or conducting directory traversal attacks.
You can find more information about CVE-2020-3251 in the Cisco Security Advisory at the following URL: [https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E].