ID

VAR-202004-1251


CVE

CVE-2020-3251


TITLE

Cisco UCS Director and UCS Director Express for Big Data Past Traversal Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-004583

DESCRIPTION

Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. (DoS) It may be put into a state. Cisco UCS Director is a heterogeneous platform for Private Cloud Infrastructure as a Service (IaaS). A remote attacker could exploit this vulnerability by sending a specially crafted request to execute code on the system

Trust: 1.71

sources: NVD: CVE-2020-3251 // JVNDB: JVNDB-2020-004583 // VULHUB: VHN-181376

AFFECTED PRODUCTS

vendor:ciscomodel:ucs directorscope:eqversion:6.7.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.1.0

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope:lteversion:3.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.3

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.4

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.3

Trust: 1.0

vendor:ciscomodel:ucs directorscope: - version: -

Trust: 0.8

vendor:ciscomodel:ucs director express for big datascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-004583 // NVD: CVE-2020-3251

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3251
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3251
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-004583
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202004-1114
value: CRITICAL

Trust: 0.6

VULHUB: VHN-181376
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-3251
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-004583
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181376
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3251
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3251
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-004583
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-181376 // JVNDB: JVNDB-2020-004583 // CNNVD: CNNVD-202004-1114 // NVD: CVE-2020-3251 // NVD: CVE-2020-3251

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

problemtype:CWE-20

Trust: 1.0

sources: VULHUB: VHN-181376 // JVNDB: JVNDB-2020-004583 // NVD: CVE-2020-3251

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-1114

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202004-1114

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-004583

PATCH

title:cisco-sa-ucsd-mult-vulns-UNfpdW4Eurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E

Trust: 0.8

title:Cisco UCS Director and Cisco UCS Director Express for Big Data Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116015

Trust: 0.6

sources: JVNDB: JVNDB-2020-004583 // CNNVD: CNNVD-202004-1114

EXTERNAL IDS

db:NVDid:CVE-2020-3251

Trust: 2.5

db:JVNDBid:JVNDB-2020-004583

Trust: 0.8

db:CNNVDid:CNNVD-202004-1114

Trust: 0.7

db:AUSCERTid:ESB-2020.1327

Trust: 0.6

db:CNVDid:CNVD-2020-25351

Trust: 0.1

db:VULHUBid:VHN-181376

Trust: 0.1

sources: VULHUB: VHN-181376 // JVNDB: JVNDB-2020-004583 // CNNVD: CNNVD-202004-1114 // NVD: CVE-2020-3251

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-ucsd-mult-vulns-unfpdw4e

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-3251

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3251

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.1327/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-ucs-director-multiple-vulnerabilities-via-rest-api-32042

Trust: 0.6

sources: VULHUB: VHN-181376 // JVNDB: JVNDB-2020-004583 // CNNVD: CNNVD-202004-1114 // NVD: CVE-2020-3251

SOURCES

db:VULHUBid:VHN-181376
db:JVNDBid:JVNDB-2020-004583
db:CNNVDid:CNNVD-202004-1114
db:NVDid:CVE-2020-3251

LAST UPDATE DATE

2024-11-23T21:51:34.776000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181376date:2020-04-23T00:00:00
db:JVNDBid:JVNDB-2020-004583date:2020-05-21T00:00:00
db:CNNVDid:CNNVD-202004-1114date:2020-04-21T00:00:00
db:NVDid:CVE-2020-3251date:2024-11-21T05:30:39.540

SOURCES RELEASE DATE

db:VULHUBid:VHN-181376date:2020-04-15T00:00:00
db:JVNDBid:JVNDB-2020-004583date:2020-05-21T00:00:00
db:CNNVDid:CNNVD-202004-1114date:2020-04-15T00:00:00
db:NVDid:CVE-2020-3251date:2020-04-15T21:15:35.873