First published: Wed Apr 15 2020(Updated: )
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
Credit: Steven Seeley (mr_me) Source Incite working with Trend Micro Zero Day Initiative for reporting the following vulnerabilitiesSteven Seeley (mr_me) Source Incite for reporting the following vulnerabilities
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco UCS Director | ||
Cisco UCS Director Express for Big Data |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of Cisco SA UCS Director Multiple Vulnerabilities is high as they can potentially allow remote attackers to bypass authentication and exploit sensitive data.
To fix Cisco SA UCS Director Multiple Vulnerabilities, update your Cisco UCS Director and Cisco UCS Director Express for Big Data to the latest available version.
Cisco SA UCS Director Multiple Vulnerabilities may allow attackers to conduct authentication bypass and directory traversal attacks.
The affected products include Cisco UCS Director and Cisco UCS Director Express for Big Data.
Yes, the vulnerabilities can be exploited remotely by attackers to gain unauthorized access.