Cisco.UCS.Director.saveWindowsNetworkConfig.Directory.Traversal

description-logoDescription

This indicates an attack attempt to exploit a Directory Traversal Vulnerability in Cisco Systems UCS Director.
The vulnerability is due to insufficient validation of user input in the saveWindowsNetworkConfig method. A remote authenticated attacker can exploit the vulnerability by sending malicious requests to the target server. Successful exploitation could result in arbitrary file write leading to denial of service conditions.

affected-products-logoAffected Products

Cisco Systems UCS Director prior to 6.7.4.0
Cisco Systems UCS Director Express for Big Data prior to 3.7.4.0

Impact logoImpact

Denial of Service: Remote attackers can crash vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-10-15 16.944 Default_action:pass:drop
2020-09-03 16.917