Lenovo Xclarity Controller vulnerabilities

15 known vulnerabilities affecting lenovo/xclarity_controller.

Total CVEs
15
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH8MEDIUM7

Vulnerabilities

Page 1 of 1
CVE-2024-38511HIGHCVSS 7.2vvarious2024-07-26
CVE-2024-38511 [HIGH] CWE-78 CVE-2024-38511: A privilege escalation vulnerability was discovered in an upload processing functionality of XCC tha A privilege escalation vulnerability was discovered in an upload processing functionality of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.
cvelistv5nvd
CVE-2024-38510HIGHCVSS 7.2vvarious2024-07-26
CVE-2024-38510 [HIGH] CWE-78 CVE-2024-38510: A privilege escalation vulnerability was discovered in the SSH captive command shell interface that A privilege escalation vulnerability was discovered in the SSH captive command shell interface that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.
cvelistv5nvd
CVE-2024-38512HIGHCVSS 7.2vvarious2024-07-26
CVE-2024-38512 [HIGH] CWE-78 CVE-2024-38512: A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC use A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.
cvelistv5nvd
CVE-2024-38508HIGHCVSS 7.2vvarious2024-07-26
CVE-2024-38508 [HIGH] CWE-78 CVE-2024-38508: A privilege escalation vulnerability was discovered in the web interface or SSH captive command shel A privilege escalation vulnerability was discovered in the web interface or SSH captive command shell interface of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via a specially crafted request.
cvelistv5nvd
CVE-2024-38509HIGHCVSS 7.2vvarious2024-07-26
CVE-2024-38509 [HIGH] CWE-121 CVE-2024-38509: A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC use A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to execute arbitrary code via a specially crafted IPMI command.
cvelistv5nvd
CVE-2023-25492HIGHCVSS 8.8vSee product security advisory below2023-05-01
CVE-2023-25492 [MEDIUM] CWE-134 CVE-2023-25492: A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API.
cvelistv5nvd
CVE-2023-0683HIGHCVSS 8.8vSee product security advisory below2023-05-01
CVE-2023-0683 [HIGH] CWE-20 CVE-2023-0683: A valid, authenticated XCC user with read only access may gain elevated privileges through a specifi A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.
cvelistv5nvd
CVE-2023-29057HIGHCVSS 8.8vRefer to Mitigation strategy section in LEN-1183212023-04-28
CVE-2023-29057 [HIGH] CWE-276 CVE-2023-29057: A valid XCC user's local account permissions overrides their active directory permissions under spec A valid XCC user's local account permissions overrides their active directory permissions under specific configurations. This could lead to a privilege escalation. To be vulnerable, LDAP must be configured for authentication/authorization and logins configured as “Local First, then LDAP”.
cvelistv5nvd
CVE-2023-29058MEDIUMCVSS 6.5vRefer to Mitigation strategy section in LEN-1183212023-04-28
CVE-2023-29058 [MEDIUM] CWE-276 CVE-2023-29058: A valid, authenticated XCC user with read-only permissions can modify custom user roles on other use A valid, authenticated XCC user with read-only permissions can modify custom user roles on other user accounts and the user trespass message through the XCC CLI. There is no exposure if SSH is disabled or if there are no users assigned optional read-only permissions.
cvelistv5nvd
CVE-2023-25495MEDIUMCVSS 4.9vRefer to Mitigation strategy section in LEN-999362023-04-28
CVE-2023-25495 [MEDIUM] CWE-522 CVE-2023-25495: A valid, authenticated administrative user can query a web interface API to reveal the configured LD A valid, authenticated administrative user can query a web interface API to reveal the configured LDAP client password used by XCC to authenticate to an external LDAP server in certain configurations. There is no exposure where no LDAP client password is configured
cvelistv5nvd
CVE-2023-29056MEDIUMCVSS 5.9vRefer to Mitigation strategy section in LEN-1183212023-04-28
CVE-2023-29056 [MEDIUM] CWE-269 CVE-2023-29056: A valid LDAP user, under specific conditions, will default to read-only permissions when authenticat A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute not defined.
cvelistv5nvd
CVE-2021-3956MEDIUMCVSS 5.3fixed in 7.22_cdi382ofixed in 2.32_psi342n+3 more2022-05-18
CVE-2021-3956 [MEDIUM] CWE-863 CVE-2021-3956: A read-only authentication bypass vulnerability was reported in the Third Quarter 2021 release of Le A read-only authentication bypass vulnerability was reported in the Third Quarter 2021 release of Lenovo XClarity Controller (XCC) firmware affecting XCC devices configured in LDAP Authentication Only Mode and using an LDAP server that supports “unauthenticated bind”, such as Microsoft Active Directory. An unauthenticated user can gain read-only acces
nvd
CVE-2021-3473MEDIUMCVSS 4.9v6.00_cdi370qv1.10_tgbt12q+2 more2021-04-13
CVE-2021-3473 [MEDIUM] CWE-319 CVE-2021-3473: An internal product security audit of Lenovo XClarity Controller (XCC) discovered that the XCC confi An internal product security audit of Lenovo XClarity Controller (XCC) discovered that the XCC configuration backup/restore password may be written to an internal XCC log buffer if Lenovo XClarity Administrator (LXCA) is used to perform the backup/restore. The backup/restore password typically exists in this internal log buffer for less than 10 minute
nvd
CVE-2019-6195MEDIUMCVSS 4.8fixed in 3.01_tei392ofixed in 3.08_cdi340v+1 more2020-02-14
CVE-2019-6195 [MEDIUM] CWE-264 CVE-2019-6195: An authorization bypass exists in Lenovo XClarity Controller (XCC) versions prior to 3.08 CDI340V, 3 An authorization bypass exists in Lenovo XClarity Controller (XCC) versions prior to 3.08 CDI340V, 3.01 TEI392O, 1.71 PSI328N where a valid authenticated user with lesser privileges may be granted read-only access to higher-privileged information if 1) “LDAP Authentication Only with Local Authorization” mode is configured and used by XCC, and 2) a les
nvd
CVE-2019-6187MEDIUMCVSS 6.5fixed in tei392mfixed in cdi340m+2 more2019-11-20
CVE-2019-6187 [MEDIUM] CWE-1236 CVE-2019-6187: A stored CSV Injection vulnerability was reported in Lenovo XClarity Controller (XCC) that could all A stored CSV Injection vulnerability was reported in Lenovo XClarity Controller (XCC) that could allow an administrative or other appropriately permissioned user to store malformed data in certain XCC server informational fields, that could result in crafted formulas being stored in an exported CSV file. The crafted formula is not executed on XCC its
nvd