CVE-2020-3241 | Date: (C)2020-06-18 (M)2023-12-22 |
A vulnerability in the orchestration tasks of Cisco UCS Director could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input on the web-based management interface. An attacker could exploit this vulnerability by creating a task with specific configuration parameters. A successful exploit could allow the attacker to overwrite arbitrary files in the file system of an affected device.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : 6.5 | CVSS Score : 8.5 |
Exploit Score: 1.2 | Exploit Score: 8.0 |
Impact Score: 5.2 | Impact Score: 9.2 |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: NETWORK | Access Vector: NETWORK |
Attack Complexity: LOW | Access Complexity: LOW |
Privileges Required: HIGH | Authentication: SINGLE |
User Interaction: NONE | Confidentiality: NONE |
Scope: UNCHANGED | Integrity: COMPLETE |
Confidentiality: NONE | Availability: COMPLETE |
Integrity: HIGH | |
Availability: HIGH | |
| |