Product:

Ucs_manager

(Cisco)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 8
Date Id Summary Products Score Patch Annotated
2020-02-05 CVE-2020-3120 A vulnerability in the Cisco Discovery Protocol implementation for Cisco FXOS Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to a missing check when the affected software processes Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to... Firepower_extensible_operating_system, Fxos, Ios_xr, Nx\-Os, Ucs_manager 6.5
2020-02-05 CVE-2020-3119 A vulnerability in the Cisco Discovery Protocol implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device. The vulnerability exists because the Cisco Discovery Protocol parser does not properly validate input for certain fields in a Cisco Discovery Protocol message. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. An... Nx\-Os, Ucs_manager 8.8
2020-02-26 CVE-2020-3167 A vulnerability in the CLI of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS). The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to specific commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently... Adaptive_security_appliance_software, Firepower_extensible_operating_system, Firepower_threat_defense, Ucs_manager 7.8
2020-02-26 CVE-2020-3172 A vulnerability in the Cisco Discovery Protocol feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code as root or cause a denial of service (DoS) condition on an affected device. The vulnerability exists because of insufficiently validated Cisco Discovery Protocol packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a Layer 2-adjacent affected device. A... Firepower_extensible_operating_system, Nx\-Os, Ucs_manager 8.8
2020-02-26 CVE-2020-3171 A vulnerability in the local management (local-mgmt) CLI of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to specific commands. A successful exploit could allow the attacker to execute arbitrary commands on the... Fxos, Ucs_manager 7.8
2020-02-26 CVE-2020-3173 A vulnerability in the local management (local-mgmt) CLI of Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) on an affected device. The vulnerability is due to insufficient input validation of command arguments. An attacker could exploit this vulnerability by including crafted arguments to specific commands on the local management CLI. A successful exploit could allow the attacker to execute... Ucs_manager 7.8
2021-05-06 CVE-2021-1397 A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability... C125_m5_firmware, C220_m5_firmware, C220_m6_firmware, C225_m6_firmware, C240_m5_firmware, C240_m6_firmware, C245_m6_firmware, C480_m5_firmware, C480_ml_m5_firmware, Encs_5100_firmware, Encs_5400_firmware, Integrated_management_controller, Ucs\-E1120d\-M3_firmware, Ucs\-E140d_firmware, Ucs\-E140dp_firmware, Ucs\-E140s\-M1_firmware, Ucs\-E140s\-M2_firmware, Ucs\-E140s_firmware, Ucs\-E160d_firmware, Ucs\-E160dp\-M1_firmware, Ucs\-E160s\-M3_firmware, Ucs\-E180d\-M2_firmware, Ucs\-E180d\-M3_firmware, Ucs_manager, Ucs_s3260_firmware 6.1
2020-06-02 CVE-2020-10136 IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing. Nx\-Os, Ucs_manager, Unified_computing_system, Saros, X3220nr_firmware, Tcp\/ip 5.3