Vulnerability Details CVE-2020-8349
An internal security review has identified an unauthenticated remote code execution vulnerability in Cloud Networking Operating System (CNOS)’ optional REST API management interface. This interface is disabled by default and not vulnerable unless enabled. When enabled, it is only vulnerable where attached to a VRF and as allowed by defined ACLs. Lenovo strongly recommends upgrading to a non-vulnerable CNOS release. Where not possible, Lenovo recommends disabling the REST API management interface or restricting access to the management VRF and further limiting access to authorized management stations via ACL.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.026
EPSS Ranking 84.8%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 6.8
Products affected by CVE-2020-8349
-
cpe:2.3:h:lenovo:rackswitch_g8272:-
-
cpe:2.3:h:lenovo:rackswitch_g8296:-
-
cpe:2.3:h:lenovo:rackswitch_g8332:-
-
cpe:2.3:h:lenovo:rackswitch_ne0152t:-
-
cpe:2.3:h:lenovo:rackswitch_ne10032:-
-
cpe:2.3:h:lenovo:rackswitch_ne1032:-
-
cpe:2.3:h:lenovo:rackswitch_ne1032t:-
-
cpe:2.3:h:lenovo:rackswitch_ne1072t:-
-
cpe:2.3:h:lenovo:rackswitch_ne2572:-
-
cpe:2.3:o:lenovo:cloud_networking_operating_system:-