ID

VAR-202004-1245


CVE

CVE-2020-3240


TITLE

Cisco UCS Director and Cisco UCS Director Express for Big Data Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-004411

DESCRIPTION

Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. (DoS) It may be put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the ScriptModuleAddJarPage method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the tomcatu account. Cisco UCS Director is a heterogeneous platform for Private Cloud Infrastructure as a Service (IaaS)

Trust: 2.43

sources: NVD: CVE-2020-3240 // JVNDB: JVNDB-2020-004411 // ZDI: ZDI-20-542 // VULHUB: VHN-181365 // VULMON: CVE-2020-3240

AFFECTED PRODUCTS

vendor:ciscomodel:ucs directorscope: - version: -

Trust: 1.5

vendor:ciscomodel:ucs directorscope:eqversion:6.7.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.1.0

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope:lteversion:3.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.3

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.4

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.3

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope: - version: -

Trust: 0.8

sources: ZDI: ZDI-20-542 // JVNDB: JVNDB-2020-004411 // NVD: CVE-2020-3240

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3240
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3240
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-004411
value: HIGH

Trust: 0.8

ZDI: CVE-2020-3240
value: CRITICAL

Trust: 0.7

CNNVD: CNNVD-202004-1108
value: HIGH

Trust: 0.6

VULHUB: VHN-181365
value: HIGH

Trust: 0.1

VULMON: CVE-2020-3240
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-3240
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-004411
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181365
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3240
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.3
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3240
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-004411
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2020-3240
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-542 // VULHUB: VHN-181365 // VULMON: CVE-2020-3240 // JVNDB: JVNDB-2020-004411 // CNNVD: CNNVD-202004-1108 // NVD: CVE-2020-3240 // NVD: CVE-2020-3240

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-181365 // JVNDB: JVNDB-2020-004411 // NVD: CVE-2020-3240

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202004-1108

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202004-1108

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-004411

PATCH

title:cisco-sa-ucsd-mult-vulns-UNfpdW4Eurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E

Trust: 1.5

title:Cisco UCS Director and Cisco UCS Director Express for Big Data Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116446

Trust: 0.6

title:Cisco: Multiple Vulnerabilities in Cisco UCS Director and Cisco UCS Director Express for Big Dataurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-ucsd-mult-vulns-UNfpdW4E

Trust: 0.1

title:Threatposturl:https://threatpost.com/critical-cisco-ip-phone-rce-flaw/154864/

Trust: 0.1

sources: ZDI: ZDI-20-542 // VULMON: CVE-2020-3240 // JVNDB: JVNDB-2020-004411 // CNNVD: CNNVD-202004-1108

EXTERNAL IDS

db:NVDid:CVE-2020-3240

Trust: 3.3

db:ZDIid:ZDI-20-542

Trust: 2.5

db:JVNDBid:JVNDB-2020-004411

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-9565

Trust: 0.7

db:CNNVDid:CNNVD-202004-1108

Trust: 0.7

db:AUSCERTid:ESB-2020.1327.2

Trust: 0.6

db:AUSCERTid:ESB-2020.1327

Trust: 0.6

db:CNVDid:CNVD-2020-25346

Trust: 0.1

db:VULHUBid:VHN-181365

Trust: 0.1

db:VULMONid:CVE-2020-3240

Trust: 0.1

sources: ZDI: ZDI-20-542 // VULHUB: VHN-181365 // VULMON: CVE-2020-3240 // JVNDB: JVNDB-2020-004411 // CNNVD: CNNVD-202004-1108 // NVD: CVE-2020-3240

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-ucsd-mult-vulns-unfpdw4e

Trust: 3.1

url:https://www.zerodayinitiative.com/advisories/zdi-20-542/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-3240

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3240

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.1327/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-ucs-director-multiple-vulnerabilities-via-rest-api-32042

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1327.2/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/179858

Trust: 0.1

url:https://threatpost.com/critical-cisco-ip-phone-rce-flaw/154864/

Trust: 0.1

sources: ZDI: ZDI-20-542 // VULHUB: VHN-181365 // VULMON: CVE-2020-3240 // JVNDB: JVNDB-2020-004411 // CNNVD: CNNVD-202004-1108 // NVD: CVE-2020-3240

CREDITS

Steven Seeley (mr_me) of Source Incite

Trust: 0.7

sources: ZDI: ZDI-20-542

SOURCES

db:ZDIid:ZDI-20-542
db:VULHUBid:VHN-181365
db:VULMONid:CVE-2020-3240
db:JVNDBid:JVNDB-2020-004411
db:CNNVDid:CNNVD-202004-1108
db:NVDid:CVE-2020-3240

LAST UPDATE DATE

2024-11-23T21:51:34.608000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-542date:2020-04-16T00:00:00
db:VULHUBid:VHN-181365date:2020-04-21T00:00:00
db:VULMONid:CVE-2020-3240date:2020-04-21T00:00:00
db:JVNDBid:JVNDB-2020-004411date:2020-05-14T00:00:00
db:CNNVDid:CNNVD-202004-1108date:2020-04-26T00:00:00
db:NVDid:CVE-2020-3240date:2024-11-21T05:30:38.240

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-542date:2020-04-16T00:00:00
db:VULHUBid:VHN-181365date:2020-04-15T00:00:00
db:VULMONid:CVE-2020-3240date:2020-04-15T00:00:00
db:JVNDBid:JVNDB-2020-004411date:2020-05-14T00:00:00
db:CNNVDid:CNNVD-202004-1108date:2020-04-15T00:00:00
db:NVDid:CVE-2020-3240date:2020-04-15T21:15:35.467