Language:
https://tools.cisco.com/bugsearch/bug/CSCvs53493
https://tools.cisco.com/bugsearch/bug/CSCvs53496
https://tools.cisco.com/bugsearch/bug/CSCvs53500
https://tools.cisco.com/bugsearch/bug/CSCvs53502
https://tools.cisco.com/bugsearch/bug/CSCvs56399
https://tools.cisco.com/bugsearch/bug/CSCvs56400
https://tools.cisco.com/bugsearch/bug/CSCvs56401
https://tools.cisco.com/bugsearch/bug/CSCvs69022
https://tools.cisco.com/bugsearch/bug/CSCvs69171
https://tools.cisco.com/bugsearch/bug/CSCvt39489
https://tools.cisco.com/bugsearch/bug/CSCvt39526
https://tools.cisco.com/bugsearch/bug/CSCvt39535
https://tools.cisco.com/bugsearch/bug/CSCvt39555
https://tools.cisco.com/bugsearch/bug/CSCvt39561
https://tools.cisco.com/bugsearch/bug/CSCvt39565
https://tools.cisco.com/bugsearch/bug/CSCvt39575
Severity: Critical
ID: 135766
File Name: cisco-sa-ucsd-mult-vulns-UNfpdW4E.nasl
Version: 1.6
Type: combined
Family: CISCO
Published: 4/21/2020
Updated: 3/15/2024
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2020-3248
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2020-3250
CPE: cpe:/a:cisco:ucs_director
Required KB Items: Host/Cisco/UCSDirector/version
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/15/2020
Vulnerability Publication Date: 4/15/2020
Metasploit (Cisco UCS Director Cloupia Script RCE)
Elliot (Cisco UCS Director Directory Traversal)
CVE: CVE-2020-3239, CVE-2020-3240, CVE-2020-3243, CVE-2020-3247, CVE-2020-3248, CVE-2020-3249, CVE-2020-3250, CVE-2020-3251, CVE-2020-3252
CISCO-BUG-ID: CSCvs53493, CSCvs53496, CSCvs53500, CSCvs53502, CSCvs56399, CSCvs56400, CSCvs56401, CSCvs69022, CSCvs69171, CSCvt39489, CSCvt39526, CSCvt39535, CSCvt39555, CSCvt39561, CSCvt39565, CSCvt39575, CSCvt39580