Unrated severityNVD Advisory· Published Jun 18, 2020· Updated Nov 15, 2024
Cisco UCS Director Path Traversal Vulnerability
CVE-2020-3241
Description
A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker could exploit this vulnerability by creating a task with specific configuration parameters. A successful exploit could allow the attacker to overwrite arbitrary files in the file system of an affected device.
Affected products
1- Range: n/a
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-task-path-trav-d67ZuAk7mitrevendor-advisoryx_refsource_CISCO
News mentions
0No linked articles in our index yet.