|
|||
Rule General Information |
---|
Release Date: | 2020-06-08 | |
Rule Name: | Cisco UCS Director Directory Traversals Vulnerability (CVE-2020-3250) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. | |
Impact: | An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information. | |
Affected OS: | Windows, Linux, Network Device, Others | |
Reference: | http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E ZeroDayInitiative:ZDI-20-538 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E |