ID

VAR-202004-1252


CVE

CVE-2020-3252


TITLE

Cisco UCS Director and UCS Director Express for Big Data Past Traversal Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-004584

DESCRIPTION

Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco UCS Director is a heterogeneous platform of private cloud infrastructure as a service (IaaS) of Cisco (Cisco). A path traversal vulnerability exists in the REST API endpoints in Cisco UCS Director due to the program not adequately validating user input sent to the REST API. A remote attacker could exploit this vulnerability by sending a specially crafted request to read arbitrary files on the system

Trust: 1.71

sources: NVD: CVE-2020-3252 // JVNDB: JVNDB-2020-004584 // VULHUB: VHN-181377

AFFECTED PRODUCTS

vendor:ciscomodel:ucs directorscope:eqversion:6.7.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.2

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.1.0

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope:lteversion:3.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.1

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.2.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.1.3

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.4

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.3.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.7.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.3

Trust: 1.0

vendor:ciscomodel:ucs directorscope: - version: -

Trust: 0.8

vendor:ciscomodel:ucs director express for big datascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-004584 // NVD: CVE-2020-3252

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3252
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3252
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-004584
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202004-1115
value: MEDIUM

Trust: 0.6

VULHUB: VHN-181377
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-3252
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-004584
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181377
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3252
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3252
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-004584
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-181377 // JVNDB: JVNDB-2020-004584 // CNNVD: CNNVD-202004-1115 // NVD: CVE-2020-3252 // NVD: CVE-2020-3252

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

problemtype:CWE-20

Trust: 1.0

sources: VULHUB: VHN-181377 // JVNDB: JVNDB-2020-004584 // NVD: CVE-2020-3252

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-1115

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202004-1115

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-004584

PATCH

title:cisco-sa-ucsd-mult-vulns-UNfpdW4Eurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E

Trust: 0.8

title:Cisco UCS Director Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=116851

Trust: 0.6

sources: JVNDB: JVNDB-2020-004584 // CNNVD: CNNVD-202004-1115

EXTERNAL IDS

db:NVDid:CVE-2020-3252

Trust: 2.5

db:JVNDBid:JVNDB-2020-004584

Trust: 0.8

db:CNNVDid:CNNVD-202004-1115

Trust: 0.7

db:AUSCERTid:ESB-2020.1327.2

Trust: 0.6

db:AUSCERTid:ESB-2020.1327

Trust: 0.6

db:CNVDid:CNVD-2020-25352

Trust: 0.1

db:VULHUBid:VHN-181377

Trust: 0.1

sources: VULHUB: VHN-181377 // JVNDB: JVNDB-2020-004584 // CNNVD: CNNVD-202004-1115 // NVD: CVE-2020-3252

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-ucsd-mult-vulns-unfpdw4e

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-3252

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3252

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.1327/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-ucs-director-multiple-vulnerabilities-via-rest-api-32042

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1327.2/

Trust: 0.6

sources: VULHUB: VHN-181377 // JVNDB: JVNDB-2020-004584 // CNNVD: CNNVD-202004-1115 // NVD: CVE-2020-3252

SOURCES

db:VULHUBid:VHN-181377
db:JVNDBid:JVNDB-2020-004584
db:CNNVDid:CNNVD-202004-1115
db:NVDid:CVE-2020-3252

LAST UPDATE DATE

2024-11-23T21:51:34.801000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181377date:2020-04-23T00:00:00
db:JVNDBid:JVNDB-2020-004584date:2020-05-21T00:00:00
db:CNNVDid:CNNVD-202004-1115date:2022-03-22T00:00:00
db:NVDid:CVE-2020-3252date:2024-11-21T05:30:39.657

SOURCES RELEASE DATE

db:VULHUBid:VHN-181377date:2020-04-15T00:00:00
db:JVNDBid:JVNDB-2020-004584date:2020-05-21T00:00:00
db:CNNVDid:CNNVD-202004-1115date:2020-04-15T00:00:00
db:NVDid:CVE-2020-3252date:2020-04-15T21:15:35.933