RULE(RULE ID:330308)

Rule General Information
Release Date: 2020-06-08
Rule Name: Cisco UCS Director Directory Traversals Vulnerability (CVE-2020-3250)
Severity:
CVE ID:
Rule Protection Details
Description: Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Impact: An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information.
Affected OS: Windows, Linux, Network Device, Others
Reference: http://packetstormsecurity.com/files/157955/Cisco-UCS-Director-Cloupia-Script-Remote-Code-Execution.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E
ZeroDayInitiative:ZDI-20-538
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E