### [CVE-2020-3251](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3251) ![](https://img.shields.io/static/v1?label=Product&message=Cisco%20UCS%20Director%20&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20&color=brighgreen) ### Description Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. ### POC #### Reference - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E #### Github No PoCs found on GitHub currently.