This vulnerability allows remote attackers to bypass authentication on affected installations of Cisco UCS Director. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of the X-Cloupia-Request-Key field in requests. The issue results from the lack of proper validation of the user-supplied field prior to using it in authentication operations. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-20-540 is considered a high severity vulnerability due to the potential for unauthorized remote access.
To fix ZDI-20-540, ensure that you apply the latest security patches provided by Cisco for UCS Director.
ZDI-20-540 allows remote attackers to bypass authentication, potentially compromising sensitive information and system integrity.
Yes, there are reports of active exploitation in the wild for ZDI-20-540, highlighting its critical nature.
ZDI-20-540 affects installations of Cisco UCS Director that process the X-Cloupia-Request-Key without proper authentication.