This vulnerability allows remote attackers to overwrite arbitrary files on affected installations of Cisco UCS Director. Authentication is not required to exploit this vulnerability. The specific flaw exists within the saveWindowsNetworkConfig method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-9604 is high due to the potential for remote attackers to overwrite arbitrary files without authentication.
To fix ZDI-CAN-9604, update your Cisco UCS Director to the latest patched version as recommended by Cisco.
Cisco UCS Director installations that are not updated are affected by ZDI-CAN-9604.
ZDI-CAN-9604 can be exploited remotely and does not require authentication, making it highly exploitable.
The specific method vulnerable in ZDI-CAN-9604 is the saveWindowsNetworkConfig method.