CVE-2020-3247
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
15/04/2020
Last modified:
21/04/2020
Description
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:ucs_director:6.0.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.0.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.0.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.0.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.0.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.0.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.5.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.5.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.5.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.5.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.6.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.6.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.6.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:ucs_director:6.7.0.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page