Lenovo

Thinkedge Se450 Firmware

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.35%
  • Veröffentlicht 13.09.2024 18:15:07
  • Zuletzt bearbeitet 14.09.2024 11:47:14

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection or cause a recoverable denial of service using a specially crafted file.

  • EPSS 1.44%
  • Veröffentlicht 13.09.2024 18:15:07
  • Zuletzt bearbeitet 14.09.2024 11:47:14

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection through specially crafted command line input in the XCC SSH captive shell.

  • EPSS 1.44%
  • Veröffentlicht 13.09.2024 18:15:06
  • Zuletzt bearbeitet 14.09.2024 11:47:14

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.

  • EPSS 1.18%
  • Veröffentlicht 13.09.2024 18:15:06
  • Zuletzt bearbeitet 14.09.2024 11:47:14

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • EPSS 0.13%
  • Veröffentlicht 25.10.2023 18:17:41
  • Zuletzt bearbeitet 21.11.2024 08:35:32

An authenticated XCC user can change permissions for any user through a crafted API command.

  • EPSS 0.24%
  • Veröffentlicht 01.05.2023 15:15:09
  • Zuletzt bearbeitet 21.11.2024 07:37:37

A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.

  • EPSS 0.15%
  • Veröffentlicht 01.05.2023 15:15:09
  • Zuletzt bearbeitet 21.11.2024 07:49:36

A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API.

  • EPSS 0.15%
  • Veröffentlicht 28.04.2023 22:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:27

A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute ...

  • EPSS 0.11%
  • Veröffentlicht 28.04.2023 22:15:08
  • Zuletzt bearbeitet 21.11.2024 07:49:37

A valid, authenticated administrative user can query a web interface API to reveal the configured LDAP client password used by XCC to authenticate to an external LDAP server in certain configurations. There is no exposure where no LDAP client passwo...

  • EPSS 0.12%
  • Veröffentlicht 28.04.2023 21:15:08
  • Zuletzt bearbeitet 21.11.2024 07:56:28

A valid XCC user's local account permissions overrides their active directory permissions under specific configurations. This could lead to a privilege escalation. To be vulnerable, LDAP must be configured for authentication/authorization and logins ...