CVE-2020-3243

9.8 CRITICAL

📋 TL;DR

Multiple vulnerabilities in Cisco UCS Director and UCS Director Express for Big Data REST API allow remote attackers to bypass authentication or conduct directory traversal attacks. This affects systems running vulnerable versions of these Cisco management products. Successful exploitation could lead to unauthorized access and remote code execution.

💻 Affected Systems

Products:
  • Cisco UCS Director
  • Cisco UCS Director Express for Big Data
Versions: All versions prior to 6.7.4.0
Operating Systems: Linux-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Default installations are vulnerable. REST API is typically enabled by default for management functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full administrative control, executes arbitrary code, and compromises the entire UCS management infrastructure.

🟠

Likely Case

Attackers bypass authentication to access sensitive configuration data, perform directory traversal to read arbitrary files, and potentially execute limited commands.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated management network segment.

🌐 Internet-Facing: HIGH - REST API endpoints are typically exposed and vulnerable to unauthenticated attacks.
🏢 Internal Only: HIGH - Even internally, these vulnerabilities allow lateral movement and privilege escalation within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts available. Authentication bypass and directory traversal are straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.7.4.0 and later

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E

Restart Required: Yes

Instructions:

1. Download patch from Cisco Software Center. 2. Backup current configuration. 3. Apply patch via UCS Director admin interface. 4. Restart services or appliance as required.

🔧 Temporary Workarounds

Restrict REST API Access

linux

Limit network access to UCS Director REST API endpoints using firewall rules.

iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Unused REST Endpoints

linux

Disable specific REST API endpoints not required for operations.

Modify /opt/infra/webapps/ROOT/WEB-INF/web.xml to restrict endpoints

🧯 If You Can't Patch

  • Isolate UCS Director appliance in dedicated management VLAN with strict access controls.
  • Implement network-based intrusion detection to monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check UCS Director version via admin interface: System > About. If version is below 6.7.4.0, system is vulnerable.

Check Version:

ssh admin@ucs-director 'cat /opt/infra/version.properties'

Verify Fix Applied:

Verify version is 6.7.4.0 or higher in System > About. Test REST API authentication requirements.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated REST API requests to sensitive endpoints
  • Multiple failed authentication attempts followed by successful access
  • Unusual file access patterns in /opt/infra/logs/

Network Indicators:

  • Unusual REST API traffic patterns
  • Requests to /cloupia/script or other vulnerable endpoints without authentication

SIEM Query:

source="ucs-director" AND (uri_path="/cloupia/*" OR status_code=200) AND auth_status="failed"

🔗 References

📤 Share & Export