// For flags

CVE-2020-3242

Cisco UCS Director Information Disclosure Vulnerability

Severity Score

4.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the REST API of Cisco UCS Director could allow an authenticated, remote attacker with administrative privileges to obtain confidential information from an affected device. The vulnerability exists because confidential information is returned as part of an API response. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to obtain the API key of another user, which would allow the attacker to impersonate the account of that user on the affected device. To exploit this vulnerability, the attacker must have administrative privileges on the device.

Una vulnerabilidad en la API REST de Cisco UCS Director, podría permitir a un atacante remoto autenticado con privilegios administrativos obtener información confidencial de un dispositivo afectado. La vulnerabilidad se presenta porque la información confidencial se devuelve como parte de una respuesta de la API. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición diseñada hacia la API. Una explotación con éxito podría permitir al atacante obtener la clave de la API de otro usuario, lo que le permitiría suplantar la cuenta de ese usuario en el dispositivo afectado. Para explotar esta vulnerabilidad, el atacante debe tener privilegios administrativos en el dispositivo

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-06-18 CVE Published
  • 2024-07-27 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ucs Director
Search vendor "Cisco" for product "Ucs Director"
< 6.7.4.0
Search vendor "Cisco" for product "Ucs Director" and version " < 6.7.4.0"
-
Affected