6.5
CVSSv3

CVE-2020-3241

Published: 18/06/2020 Updated: 23/06/2020
CVSS v2 Base Score: 8.5 | Impact Score: 9.2 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 5.2 | Exploitability Score: 1.2
VMScore: 756
Vector: AV:N/AC:L/Au:S/C:N/I:C/A:C

Vulnerability Summary

A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote malicious user to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker could exploit this vulnerability by creating a task with specific configuration parameters. A successful exploit could allow the malicious user to overwrite arbitrary files in the file system of an affected device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ucs director

Vendor Advisories

A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface An attacker could exploit this vulnerability by creating a task wit ...