cisco integrated-management-controller-supervisor CVE-2020-3329 vulnerability in Cisco Products
Published on May 6, 2020

Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Role-Based Access Control Vulnerability
A vulnerability in role-based access control of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow a read-only authenticated, remote attacker to disable user accounts on an affected system. The vulnerability is due to incorrect allocation of the enable/disable action button under the role-based access control code on an affected system. An attacker could exploit this vulnerability by authenticating as a read-only user and then updating the roles of other users to disable them. A successful exploit could allow the attacker to disable users, including administrative users.

Vendor Advisory NVD

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2020-3329 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2020-3329

Want to know whenever a new CVE is published for Cisco products? stack.watch will email you.

 
 
 

Affected Versions

Cisco UCS Director Version n/a is affected by CVE-2020-3329

Exploit Probability

EPSS
0.14%
Percentile
33.85%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.