Lenovo

Thinkagile Hx7820 Firmware

15 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.35%
  • Published 13.09.2024 18:15:07
  • Last modified 14.09.2024 11:47:14

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection or cause a recoverable denial of service using a specially crafted file.

  • EPSS 1.44%
  • Published 13.09.2024 18:15:07
  • Last modified 14.09.2024 11:47:14

An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection through specially crafted command line input in the XCC SSH captive shell.

  • EPSS 1.44%
  • Published 13.09.2024 18:15:06
  • Last modified 14.09.2024 11:47:14

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.

  • EPSS 1.18%
  • Published 13.09.2024 18:15:06
  • Last modified 14.09.2024 11:47:14

A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • EPSS 0.13%
  • Published 25.10.2023 18:17:41
  • Last modified 21.11.2024 08:35:32

An authenticated XCC user can change permissions for any user through a crafted API command.

  • EPSS 0.24%
  • Published 01.05.2023 15:15:09
  • Last modified 21.11.2024 07:37:37

A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.

  • EPSS 0.15%
  • Published 01.05.2023 15:15:09
  • Last modified 21.11.2024 07:49:36

A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API.

  • EPSS 0.15%
  • Published 28.04.2023 22:15:09
  • Last modified 21.11.2024 07:56:27

A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute ...

  • EPSS 0.11%
  • Published 28.04.2023 22:15:08
  • Last modified 21.11.2024 07:49:37

A valid, authenticated administrative user can query a web interface API to reveal the configured LDAP client password used by XCC to authenticate to an external LDAP server in certain configurations. There is no exposure where no LDAP client passwo...

  • EPSS 0.12%
  • Published 28.04.2023 21:15:08
  • Last modified 21.11.2024 07:56:28

A valid XCC user's local account permissions overrides their active directory permissions under specific configurations. This could lead to a privilege escalation. To be vulnerable, LDAP must be configured for authentication/authorization and logins ...