5.4
CVE-2020-26063
- EPSS 0.08%
- Published 18.11.2024 16:15:05
- Last modified 18.11.2024 17:11:17
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the API endpoints of Cisco Integrated Management Controller could allow an authenticated, remote attacker to bypass authorization and take actions on a vulnerable system without authorization. The vulnerability is due to improper authorization checks on API endpoints. An attacker could exploit this vulnerability by sending malicious requests to an API endpoint. An exploit could allow the attacker to download files from or modify limited configuration options on the affected system.There are no workarounds that address this vulnerability.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorcisco
≫
Product
unified_computing_system
Default Statusunknown
Version
4.0\(1a\)
Status
affected
Version
3.2\(3n\)
Status
affected
Version
4.1\(1a\)
Status
affected
Version
4.1\(1b\)
Status
affected
Version
4.0\(4h\)
Status
affected
Version
4.1\(1c\)
Status
affected
Version
3.2\(3k\)
Status
affected
Version
3.2\(2c\)
Status
affected
Version
4.0\(4e\)
Status
affected
Version
4.0\(4g\)
Status
affected
Version
3.2\(3i\)
Status
affected
Version
4.0\(2e\)
Status
affected
Version
3.2\(3g\)
Status
affected
Version
4.0\(4a\)
Status
affected
Version
4.0\(2d\)
Status
affected
Version
3.2\(2d\)
Status
affected
Version
4.0\(1b\)
Status
affected
Version
4.0\(4f\)
Status
affected
Version
3.2\(3h\)
Status
affected
Version
3.2\(2f\)
Status
affected
Version
4.0\(4c\)
Status
affected
Version
3.2\(3a\)
Status
affected
Version
4.0\(1c\)
Status
affected
Version
3.2\(3d\)
Status
affected
Version
3.2\(2b\)
Status
affected
Version
4.0\(4b\)
Status
affected
Version
3.2\(2e\)
Status
affected
Version
4.0\(2b\)
Status
affected
Version
4.0\(4d\)
Status
affected
Version
3.2\(1d\)
Status
affected
Version
3.2\(3e\)
Status
affected
Version
3.2\(3l\)
Status
affected
Version
3.2\(3b\)
Status
affected
Version
4.0\(2a\)
Status
affected
Version
3.2\(3j\)
Status
affected
Version
4.0\(1d\)
Status
affected
Version
3.2\(3o\)
Status
affected
Version
4.0\(4i\)
Status
affected
Version
4.1\(1d\)
Status
affected
Version
4.1\(2a\)
Status
affected
Version
4.1\(1e\)
Status
affected
Version
3.2\(3p\)
Status
affected
Version
4.1\(2b\)
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.08% | 0.251 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@cisco.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
CWE-269 Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.