CVE-2020-3248

9.8 CRITICAL

📋 TL;DR

Multiple vulnerabilities in Cisco UCS Director and UCS Director Express for Big Data REST API allow remote attackers to bypass authentication or conduct directory traversal attacks. This affects organizations using these products for data center management. Attackers could gain unauthorized access to sensitive systems.

💻 Affected Systems

Products:
  • Cisco UCS Director
  • Cisco UCS Director Express for Big Data
Versions: All versions prior to 6.7.4.0
Operating Systems: Linux-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations with REST API enabled. Both physical and virtual appliances are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, access sensitive data, and pivot to other network resources.

🟠

Likely Case

Unauthorized access to management interfaces leading to data exposure, configuration changes, and potential lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable interfaces.

🌐 Internet-Facing: HIGH - REST API accessible from network allows unauthenticated exploitation.
🏢 Internal Only: HIGH - Even internal attackers can exploit these vulnerabilities to gain elevated privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple proof-of-concept exploits available. Authentication bypass and directory traversal are relatively simple to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.7.4.0 or later

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E

Restart Required: Yes

Instructions:

1. Download patch from Cisco Software Center. 2. Backup current configuration. 3. Apply patch following Cisco upgrade guide. 4. Restart services or appliance as required.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to UCS Director REST API to trusted IP addresses only

Configure firewall rules to restrict TCP/443 access to UCS Director management IP

Disable Unused Features

linux

Disable REST API if not required for operations

Consult Cisco documentation for disabling specific REST API endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate UCS Director from untrusted networks
  • Enable detailed logging and monitoring for authentication attempts and file access patterns

🔍 How to Verify

Check if Vulnerable:

Check UCS Director version via web interface (Admin > System > About) or CLI command 'show version'

Check Version:

show version | include Version

Verify Fix Applied:

Verify version is 6.7.4.0 or later and test authentication requirements for REST API endpoints

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Unusual file access patterns in REST API logs
  • Access to sensitive directories via HTTP requests

Network Indicators:

  • Unusual traffic to UCS Director REST API endpoints from unexpected sources
  • Directory traversal patterns in HTTP requests

SIEM Query:

source="ucs-director" AND (http_uri CONTAINS "../" OR (auth_result="failure" AND auth_result="success" within 5 minutes))

🔗 References

📤 Share & Export