← Volver a CVEs
CVE-2020-3470
CRITICAL9.8
Descripcion
Multiple vulnerabilities in the API subsystem of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges. The vulnerabilities are due to improper boundary checks for certain user-supplied input. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the API subsystem of an affected system. When this request is processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code with root privileges on the underlying operating system (OS).
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado11/18/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
cisco:c125_m5cisco:c220_m5cisco:c240_m5cisco:c480_m5cisco:c480_ml_m5cisco:enterprise_network_compute_system_5100cisco:enterprise_network_compute_system_5400cisco:enterprise_nfv_infrastructure_softwarecisco:integrated_management_controllercisco:ucs_c220_m3cisco:ucs_c220_m4cisco:ucs_c22_m3cisco:ucs_c240_m3cisco:ucs_c24_m3cisco:ucs_c420_m3cisco:ucs_c460_m4cisco:ucs_e-series_m1cisco:ucs_e-series_m2cisco:ucs_e-series_m3cisco:ucs_s3160cisco:ucs_s3260
Debilidades (CWE)
CWE-119CWE-20
Referencias
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-api-rce-UXwpeDHd(psirt@cisco.com)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-api-rce-UXwpeDHd(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.