Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ucs_64108_firmware
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-02-23 | CVE-2023-20012 | A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass... | Nexus_93180yc\-Fx3_firmware, Nexus_93180yc\-Fx3s_firmware, Ucs_64108_firmware, Ucs_6454_firmware, Ucs_6536_firmware, Ucs_central_software | 4.6 | ||
2023-02-23 | CVE-2023-20015 | A vulnerability in the CLI of Cisco Firepower 4100 Series, Cisco Firepower 9300 Security Appliances, and Cisco UCS 6200, 6300, 6400, and 6500 Series Fabric Interconnects could allow an authenticated, local attacker to inject unauthorized commands. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could... | Firepower_extensible_operating_system, Ucs_6200_firmware, Ucs_6248up_firmware, Ucs_6296up_firmware, Ucs_6300_firmware, Ucs_6324_firmware, Ucs_6332\-16up_firmware, Ucs_6332_firmware, Ucs_64108_firmware, Ucs_6454_firmware, Ucs_6536_firmware, Ucs_central_software | 6.7 | ||
2023-02-23 | CVE-2023-20016 | A vulnerability in the backup configuration feature of Cisco UCS Manager Software and in the configuration export feature of Cisco FXOS Software could allow an unauthenticated attacker with access to a backup file to decrypt sensitive information stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method used for the backup function. An attacker could exploit this vulnerability by leveraging a static key used for the backup... | Fxos, Ucs_6200_firmware, Ucs_6248up_firmware, Ucs_6296up_firmware, Ucs_6300_firmware, Ucs_6324_firmware, Ucs_6332\-16up_firmware, Ucs_6332_firmware, Ucs_64108_firmware, Ucs_6454_firmware, Ucs_6536_firmware, Ucs_central_software | 6.5 |