CVE-2020-3329

Severity
4.3MEDIUM
EPSS
0.1%
top 66.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 6
Latest updateMay 24

Description

A vulnerability in role-based access control of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow a read-only authenticated, remote attacker to disable user accounts on an affected system. The vulnerability is due to incorrect allocation of the enable/disable action button under the role-based access control code on an affected system. An attacker could exploit this vulnerability by authenticating as a read-only u

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

NVDcisco/ucs_director_express2.0.0.03.7.4.0
NVDcisco/ucs_director5.4.0.06.7.4.0

🔴Vulnerability Details

2
GHSA
GHSA-r92q-j6h7-wh5j: A vulnerability in role-based access control of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Ex2022-05-24
CVEList
Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Role-Based Access Control Vulnerability2020-05-06

📋Vendor Advisories

1
Cisco
Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Role-Based Access Control Vulnerability2020-05-06
CVE-2020-3329 (MEDIUM CVSS 4.3) | A vulnerability in role-based acces | cvebase.io