CVE-2020-3329
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/05/2020
Last modified:
26/10/2021
Description
A vulnerability in role-based access control of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow a read-only authenticated, remote attacker to disable user accounts on an affected system. The vulnerability is due to incorrect allocation of the enable/disable action button under the role-based access control code on an affected system. An attacker could exploit this vulnerability by authenticating as a read-only user and then updating the roles of other users to disable them. A successful exploit could allow the attacker to disable users, including administrative users.
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:* | 1.1.0.0 (including) | 2.2.1.3 (excluding) |
| cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:* | 5.4.0.0 (including) | 6.7.4.0 (excluding) |
| cpe:2.3:a:cisco:ucs_director_express_for_big_data:*:*:*:*:*:*:*:* | 2.0.0.0 (including) | 3.7.4.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



