Lucene search

K
cveLenovoCVE-2020-8349
HistoryOct 14, 2020 - 10:15 p.m.

CVE-2020-8349

2020-10-1422:15:13
CWE-20
CWE-94
lenovo
web.nvd.nist.gov
37
cve-2020-8349
cnos
rest api
remote code execution
vulnerability
lenovo
upgrade
vrf
acl
security advisory

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.006

Percentile

78.6%

An internal security review has identified an unauthenticated remote code execution vulnerability in Cloud Networking Operating System (CNOS)’ optional REST API management interface. This interface is disabled by default and not vulnerable unless enabled. When enabled, it is only vulnerable where attached to a VRF and as allowed by defined ACLs. Lenovo strongly recommends upgrading to a non-vulnerable CNOS release. Where not possible, Lenovo recommends disabling the REST API management interface or restricting access to the management VRF and further limiting access to authorized management stations via ACL.

Affected configurations

Nvd
Node
lenovocloud_networking_operating_systemRange<10.10.6.0
AND
lenovorackswitch_g8272Match-
OR
lenovorackswitch_g8296Match-
OR
lenovorackswitch_g8332Match-
OR
lenovorackswitch_ne0152tMatch-
OR
lenovorackswitch_ne10032Match-
OR
lenovorackswitch_ne1032Match-
OR
lenovorackswitch_ne1032tMatch-
OR
lenovorackswitch_ne1072tMatch-
OR
lenovorackswitch_ne2572Match-
VendorProductVersionCPE
lenovocloud_networking_operating_system*cpe:2.3:o:lenovo:cloud_networking_operating_system:*:*:*:*:*:*:*:*
lenovorackswitch_g8272-cpe:2.3:h:lenovo:rackswitch_g8272:-:*:*:*:*:*:*:*
lenovorackswitch_g8296-cpe:2.3:h:lenovo:rackswitch_g8296:-:*:*:*:*:*:*:*
lenovorackswitch_g8332-cpe:2.3:h:lenovo:rackswitch_g8332:-:*:*:*:*:*:*:*
lenovorackswitch_ne0152t-cpe:2.3:h:lenovo:rackswitch_ne0152t:-:*:*:*:*:*:*:*
lenovorackswitch_ne10032-cpe:2.3:h:lenovo:rackswitch_ne10032:-:*:*:*:*:*:*:*
lenovorackswitch_ne1032-cpe:2.3:h:lenovo:rackswitch_ne1032:-:*:*:*:*:*:*:*
lenovorackswitch_ne1032t-cpe:2.3:h:lenovo:rackswitch_ne1032t:-:*:*:*:*:*:*:*
lenovorackswitch_ne1072t-cpe:2.3:h:lenovo:rackswitch_ne1072t:-:*:*:*:*:*:*:*
lenovorackswitch_ne2572-cpe:2.3:h:lenovo:rackswitch_ne2572:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Cloud Networking Operating System (CNOS)",
    "vendor": "Lenovo",
    "versions": [
      {
        "lessThan": "10.10.6.0",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.006

Percentile

78.6%

Related for CVE-2020-8349