CVE-2020-3240
15.04.2020, 21:15
Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | ucs_director | 6.0.0.0 |
cisco | ucs_director | 6.0.0.1 |
cisco | ucs_director | 6.0.1.0 |
cisco | ucs_director | 6.0.1.1 |
cisco | ucs_director | 6.0.1.2 |
cisco | ucs_director | 6.0.1.3 |
cisco | ucs_director | 6.5.0.0 |
cisco | ucs_director | 6.5.0.1 |
cisco | ucs_director | 6.5.0.2 |
cisco | ucs_director | 6.5.0.3 |
cisco | ucs_director | 6.5.0.4 |
cisco | ucs_director | 6.6.0.0 |
cisco | ucs_director | 6.6.1.0 |
cisco | ucs_director | 6.6.2.0 |
cisco | ucs_director | 6.7.0.0 |
cisco | ucs_director | 6.7.1.0 |
cisco | ucs_director | 6.7.2.0 |
cisco | ucs_director | 6.7.3.0 |
cisco | ucs_director_express_for_big_data | 𝑥 ≤ 3.7.3.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References