First published: Wed Apr 15 2020(Updated: )
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director | =6.0.0.0 | |
Cisco UCS Director | =6.0.0.1 | |
Cisco UCS Director | =6.0.1.0 | |
Cisco UCS Director | =6.0.1.1 | |
Cisco UCS Director | =6.0.1.2 | |
Cisco UCS Director | =6.0.1.3 | |
Cisco UCS Director | =6.5.0.0 | |
Cisco UCS Director | =6.5.0.1 | |
Cisco UCS Director | =6.5.0.2 | |
Cisco UCS Director | =6.5.0.3 | |
Cisco UCS Director | =6.5.0.4 | |
Cisco UCS Director | =6.6.0.0 | |
Cisco UCS Director | =6.6.1.0 | |
Cisco UCS Director | =6.6.2.0 | |
Cisco UCS Director | =6.7.0.0 | |
Cisco UCS Director | =6.7.1.0 | |
Cisco UCS Director | =6.7.2.0 | |
Cisco UCS Director | =6.7.3.0 | |
Cisco UCS Director Express for Big Data | <=3.7.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3252 is a vulnerability in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data.
CVE-2020-3252 has a severity level of critical.
A remote attacker can exploit CVE-2020-3252 to bypass authentication or conduct directory traversal attacks on an affected device.
Cisco UCS Director versions 6.0.0.0 to 6.7.3.0 and Cisco UCS Director Express for Big Data version 3.7.3.0 are affected by CVE-2020-3252.
You can find more information about CVE-2020-3252 in the Cisco Security Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E