Vulnerabilites related to cisco - nexus_dashboard_fabric_controller
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:45
Severity ?
5.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device.
This vulnerability is due to insufficient authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to download config only or full backup files and learn sensitive configuration information. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard | * | |
cisco | nexus_dashboard_fabric_controller | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "95C6368B-22DC-4DA0-BD68-90AD842E8D5A", "versionEndExcluding": "3.2\\(1e\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "64448F53-1135-4A69-8FBC-100258CE76BF", "versionEndExcluding": "12.2.2", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the\u0026nbsp;affected endpoint. A successful exploit could allow the attacker to download config only or full backup files and learn sensitive configuration information. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface." }, { "lang": "es", "value": "Una vulnerabilidad en un endpoint de API REST espec\u00edfico de Cisco NDFC podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios obtenga informaci\u00f3n confidencial sobre un dispositivo afectado. Esta vulnerabilidad se debe a controles de autorizaci\u00f3n insuficientes en el endpoint de API REST afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API manipuladas al endpoint afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante descargue solo archivos de configuraci\u00f3n o de respaldo completo y obtenga informaci\u00f3n de configuraci\u00f3n confidencial. Esta vulnerabilidad solo afecta a un endpoint de API REST espec\u00edfico y no afecta a la interfaz de administraci\u00f3n basada en web." } ], "id": "CVE-2024-20441", "lastModified": "2024-10-08T13:45:07.300", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:15.967", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 15:26
Severity ?
5.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
5.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
5.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
Summary
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device.
This vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard_fabric_controller | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E78B4AC-793B-4405-896F-31398AF7CBD2", "versionEndExcluding": "12.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition." }, { "lang": "es", "value": "Una vulnerabilidad en Cisco Nexus Dashboard Fabric Controller (NDFC), anteriormente Cisco Data Center Network Manager (DCNM), podr\u00eda permitir que un atacante remoto autenticado con privilegios de administrador de red realice un ataque de inyecci\u00f3n de comandos contra un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los argumentos de los comandos. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando argumentos de comandos manipulados a un endpoint de API REST espec\u00edfico. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante sobrescribir archivos confidenciales o bloquear un contenedor espec\u00edfico, que se reiniciar\u00eda por s\u00ed solo, lo que provocar\u00eda una condici\u00f3n de denegaci\u00f3n de servicio (DoS) de bajo impacto." } ], "id": "CVE-2024-20444", "lastModified": "2024-10-08T15:26:38.527", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 4.2, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:16.390", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-raci-T46k3jnN" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-88" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-88" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 14:10
Severity ?
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the REST API and web UI of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to perform a command injection attack against an affected device.
This vulnerability is due to improper user authorization and insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted commands to an affected REST API endpoint or through the web UI. A successful exploit could allow the attacker to execute arbitrary commands on the CLI of a Cisco NDFC-managed device with network-admin privileges.
Note: This vulnerability does not affect Cisco NDFC when it is configured for storage area network (SAN) controller deployment.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard_fabric_controller | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "64448F53-1135-4A69-8FBC-100258CE76BF", "versionEndExcluding": "12.2.2", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the REST API and web UI of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to perform a command injection attack against an affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper user authorization and insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted commands to an affected REST API endpoint or through the web UI. A successful exploit could allow the attacker to execute arbitrary commands on the CLI of a Cisco NDFC-managed device with network-admin privileges.\r\n\u0026nbsp;\r\nNote: This vulnerability does not affect Cisco NDFC when it is configured for storage area network (SAN) controller deployment." }, { "lang": "es", "value": "Una vulnerabilidad en la API REST y la interfaz de usuario web de Cisco Nexus Dashboard Fabric Controller (NDFC) podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios realice un ataque de inyecci\u00f3n de comandos contra un dispositivo afectado. Esta vulnerabilidad se debe a una autorizaci\u00f3n de usuario incorrecta y una validaci\u00f3n insuficiente de los argumentos de los comandos. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando comandos manipulados a un endpoint de la API REST afectada o a trav\u00e9s de la interfaz de usuario web. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante ejecute comandos arbitrarios en la CLI de un dispositivo administrado por Cisco NDFC con privilegios de administrador de red. Nota: Esta vulnerabilidad no afecta a Cisco NDFC cuando est\u00e1 configurado para la implementaci\u00f3n del controlador de red de \u00e1rea de almacenamiento (SAN)." } ], "id": "CVE-2024-20432", "lastModified": "2024-10-08T14:10:35.317", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 6.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:15.550", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cmdinj-UvYZrKfr" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-03 17:15
Modified
2025-05-07 14:47
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Cisco Nexus Dashboard and Cisco Nexus Dashboard hosted services could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.
This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the affected user has administrative privileges, these actions could include modifying the system configuration and creating new privileged accounts.
Note: There are internal security mechanisms in place that limit the scope of this exploit, reducing the Security Impact Rating of this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard | * | |
cisco | nexus_dashboard_fabric_controller | * | |
cisco | nexus_dashboard_insights | * | |
cisco | nexus_dashboard_orchestrator | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1C657B7-4714-4D86-AD47-18ECF4D21B72", "versionEndExcluding": "3.1(1k)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "710A6388-52A4-4B29-9BC5-B3BF6658B1FA", "versionEndExcluding": "12.2.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_insights:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A36614F-4971-45C5-A76F-629C714C5464", "versionEndExcluding": "6.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E5A57F6-FE32-471E-9156-346A179C7BBF", "versionEndExcluding": "4.3(1.1008)", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Nexus Dashboard and Cisco Nexus Dashboard hosted services could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the affected user has administrative privileges, these actions could include modifying the system configuration and creating new privileged accounts.\r\n\r Note: There are internal security mechanisms in place that limit the scope of this exploit, reducing the Security Impact Rating of this vulnerability." }, { "lang": "es", "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Nexus Dashboard y los servicios alojados de Cisco Nexus Dashboard podr\u00eda permitir que un atacante remoto no autenticado lleve a cabo un ataque de falsificaci\u00f3n de solicitud entre sitios (CSRF) en un SYSTEM afectado. Esta vulnerabilidad se debe a protecciones CSRF insuficientes para la interfaz de administraci\u00f3n basada en web en un SYSTEM afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario para que haga clic en un enlace malicioso. Un exploit exitoso podr\u00eda permitir al atacante realizar acciones arbitrarias con el nivel de privilegio del usuario afectado. Si el usuario afectado tiene privilegios administrativos, estas acciones podr\u00edan incluir modificar la configuraci\u00f3n del SYSTEM y crear nuevas cuentas privilegiadas. Nota: Existen mecanismos de seguridad internos que limitan el alcance de este exploit, lo que reduce la clasificaci\u00f3n de impacto en la seguridad de esta vulnerabilidad." } ], "id": "CVE-2024-20281", "lastModified": "2025-05-07T14:47:49.303", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-03T17:15:47.740", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfccsrf-TEmZEfJ9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfccsrf-TEmZEfJ9" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 15:55
Severity ?
6.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Summary
A vulnerability in a logging function of Cisco Nexus Dashboard Insights could allow an attacker with access to a tech support file to view sensitive information.
This vulnerability exists because remote controller credentials are recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view remote controller admin credentials in clear text.
Note: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard_fabric_controller | * | |
cisco | nexus_dashboard_insights | * | |
cisco | nexus_dashboard_insights | * | |
cisco | nexus_dashboard_orchestrator | * | |
cisco | nexus_dashboard_orchestrator | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "6641D0DD-C16A-40E9-B30E-A1827333026C", "versionEndExcluding": "12.2.2.241", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_insights:*:*:*:*:*:*:*:*", "matchCriteriaId": "E263CD38-1453-4C37-8F72-F3CEBF74B18D", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_insights:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBA8D1B4-0D0D-4221-9CFC-9D28BB3952F5", "versionEndExcluding": "6.5.1.32", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FF72593-7A82-48A4-B3C7-1B12EFDC44A1", "versionEndExcluding": "4.2\\(3o\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB6CF0D7-782B-4B66-9BEA-67A7D3592CCB", "versionEndExcluding": "4.4.1.1012", "versionStartIncluding": "4.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in a logging function of Cisco Nexus Dashboard Insights could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because remote controller credentials are recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view remote controller admin credentials in clear text.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information." }, { "lang": "es", "value": "Una vulnerabilidad en una funci\u00f3n de registro de Cisco Nexus Dashboard Insights podr\u00eda permitir que un atacante con acceso a un archivo de soporte t\u00e9cnico vea informaci\u00f3n confidencial. Esta vulnerabilidad existe porque las credenciales del controlador remoto se registran en un registro interno que se almacena en el archivo de soporte t\u00e9cnico. Un atacante podr\u00eda aprovechar esta vulnerabilidad accediendo a un archivo de soporte t\u00e9cnico que se genera desde un sistema afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante vea las credenciales de administrador del controlador remoto en texto plano. Nota: La pr\u00e1ctica recomendada es almacenar los registros de depuraci\u00f3n y los archivos de soporte t\u00e9cnico de forma segura y compartirlos solo con partes de confianza porque pueden contener informaci\u00f3n confidencial." } ], "id": "CVE-2024-20491", "lastModified": "2024-10-08T15:55:08.933", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:17.563", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-07 20:11
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
A vulnerability in the REST API endpoints of Cisco Nexus Dashboard could allow an authenticated, low-privileged, remote attacker to perform limited Administrator actions on an affected device.
This vulnerability is due to insufficient authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions such as viewing portions of the web UI, generating config only or full backup files, and deleting tech support files. This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard | * | |
cisco | nexus_dashboard_fabric_controller | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "95C6368B-22DC-4DA0-BD68-90AD842E8D5A", "versionEndExcluding": "3.2\\(1e\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "A412AB60-1932-4696-9506-9F0994831E4D", "versionEndIncluding": "12.2.2", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the REST API endpoints of Cisco Nexus Dashboard could allow an authenticated, low-privileged, remote attacker to perform limited Administrator actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions such as viewing portions of the web UI, generating config only or full backup files, and deleting tech support files. This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface." }, { "lang": "es", "value": "Una vulnerabilidad en los endpoints de la API REST de Cisco Nexus Dashboard podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios realice acciones limitadas de administrador en un dispositivo afectado. Esta vulnerabilidad se debe a controles de autorizaci\u00f3n insuficientes en algunos endpoints de la API REST. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API manipuladas a un endpoint afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante realice funciones limitadas de administrador, como ver partes de la interfaz de usuario web, generar archivos de configuraci\u00f3n \u00fanicamente o de respaldo completo y eliminar archivos de soporte t\u00e9cnico. Esta vulnerabilidad solo afecta a un subconjunto de endpoints de la API REST y no afecta a la interfaz de administraci\u00f3n basada en web." } ], "id": "CVE-2024-20442", "lastModified": "2024-10-07T20:11:48.687", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:16.177", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 15:15
Severity ?
6.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Summary
A vulnerability in a logging function of Cisco Nexus Dashboard Fabric Controller (NDFC) and Cisco Nexus Dashboard Orchestrator (NDO) could allow an attacker with access to a tech support file to view sensitive information.
This vulnerability exists because HTTP proxy credentials could be recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view HTTP proxy server admin credentials in clear text that are configured on Nexus Dashboard to reach an external network.
Note: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard_fabric_controller | * | |
cisco | nexus_dashboard_insights | * | |
cisco | nexus_dashboard_insights | * | |
cisco | nexus_dashboard_orchestrator | * | |
cisco | nexus_dashboard_orchestrator | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "6641D0DD-C16A-40E9-B30E-A1827333026C", "versionEndExcluding": "12.2.2.241", "versionStartIncluding": "12.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_insights:*:*:*:*:*:*:*:*", "matchCriteriaId": "E263CD38-1453-4C37-8F72-F3CEBF74B18D", "versionEndExcluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_insights:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBA8D1B4-0D0D-4221-9CFC-9D28BB3952F5", "versionEndExcluding": "6.5.1.32", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FF72593-7A82-48A4-B3C7-1B12EFDC44A1", "versionEndExcluding": "4.2\\(3o\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB6CF0D7-782B-4B66-9BEA-67A7D3592CCB", "versionEndExcluding": "4.4.1.1012", "versionStartIncluding": "4.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in a logging function of Cisco Nexus Dashboard Fabric Controller (NDFC) and Cisco Nexus Dashboard Orchestrator (NDO) could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because HTTP proxy credentials could be recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view HTTP proxy server admin credentials in clear text that are configured on Nexus Dashboard to reach an external network.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information." }, { "lang": "es", "value": "Una vulnerabilidad en una funci\u00f3n de registro de Cisco Nexus Dashboard Fabric Controller (NDFC) y Cisco Nexus Dashboard Orchestrator (NDO) podr\u00eda permitir que un atacante con acceso a un archivo de soporte t\u00e9cnico vea informaci\u00f3n confidencial. Esta vulnerabilidad existe porque las credenciales de proxy HTTP se pueden registrar en un registro interno que se almacena en el archivo de soporte t\u00e9cnico. Un atacante podr\u00eda aprovechar esta vulnerabilidad al acceder a un archivo de soporte t\u00e9cnico que se genera desde un sistema afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante vea las credenciales de administrador del servidor proxy HTTP en texto plano que est\u00e1n configuradas en Nexus Dashboard para llegar a una red externa. Nota: La mejor pr\u00e1ctica es almacenar los registros de depuraci\u00f3n y los archivos de soporte t\u00e9cnico de forma segura y compartirlos solo con partes de confianza porque pueden contener informaci\u00f3n confidencial." } ], "id": "CVE-2024-20490", "lastModified": "2024-10-08T15:15:39.160", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:17.350", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 13:54
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
A vulnerability in the REST API endpoints of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to read or write files on an affected device.
This vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited network-admin functions such as reading device configuration information, uploading files, and modifying uploaded files.
Note: This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard | * | |
cisco | nexus_dashboard_fabric_controller | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "95C6368B-22DC-4DA0-BD68-90AD842E8D5A", "versionEndExcluding": "3.2\\(1e\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "64448F53-1135-4A69-8FBC-100258CE76BF", "versionEndExcluding": "12.2.2", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the REST API endpoints of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to read or write files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited network-admin functions such as reading device configuration information, uploading files, and modifying uploaded files.\r\nNote: This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface." }, { "lang": "es", "value": "Una vulnerabilidad en los endpoints de la API REST de Cisco NDFC podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios lea o escriba archivos en un dispositivo afectado. Esta vulnerabilidad existe debido a la falta de controles de autorizaci\u00f3n en algunos endpoints de la API REST. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API manipuladas a un endpoint afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante realice funciones limitadas de administraci\u00f3n de red, como leer informaci\u00f3n de configuraci\u00f3n del dispositivo, cargar archivos y modificar archivos cargados. Nota: Esta vulnerabilidad solo afecta a un subconjunto de endpoints de la API REST y no afecta a la interfaz de administraci\u00f3n basada en web." } ], "id": "CVE-2024-20438", "lastModified": "2024-10-08T13:54:46.450", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:15.753", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-693" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 15:33
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.
This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard_fabric_controller | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "A412AB60-1932-4696-9506-9F0994831E4D", "versionEndIncluding": "12.2.2", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.\r\n\r\nThis vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary\u0026nbsp;code in a specific container with the privileges of root." }, { "lang": "es", "value": "Una vulnerabilidad en Cisco Nexus Dashboard Fabric Controller (NDFC) podr\u00eda permitir que un atacante remoto autenticado con privilegios bajos ejecute c\u00f3digo arbitrario en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de ruta incorrecta. Un atacante podr\u00eda aprovechar esta vulnerabilidad utilizando el Protocolo de copia segura (SCP) para cargar c\u00f3digo malicioso en un dispositivo afectado utilizando t\u00e9cnicas de path traversal. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en un contenedor espec\u00edfico con los privilegios de superusuario." } ], "id": "CVE-2024-20449", "lastModified": "2024-10-08T15:33:29.210", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:16.820", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-23" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-06 17:15
Modified
2025-08-07 00:23
Severity ?
Summary
A vulnerability in a REST API endpoint and web-based management interface of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with read-only privileges to execute arbitrary SQL commands on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a specific REST API endpoint or web-based management interface. A successful exploit could allow the attacker to read, modify, or delete arbitrary data on an internal database, which could affect the availability of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard_fabric_controller | 12.1.2 | |
cisco | nexus_dashboard_fabric_controller | 12.1.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:12.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8CA48E2A-4C63-436E-807C-4EDD163781D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:12.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "51EE96E1-D7D3-4C58-AAA3-7A2C29B4F283", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in a REST API endpoint and web-based management interface of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with read-only privileges to execute arbitrary SQL commands on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a specific REST API endpoint or web-based management interface. A successful exploit could allow the attacker to read, modify, or delete arbitrary data on an internal database, which could affect the availability of the device.\u0026nbsp;" }, { "lang": "es", "value": "Una vulnerabilidad en un endpoint de API REST y una interfaz de administraci\u00f3n basada en web de Cisco Nexus Dashboard Fabric Controller (NDFC) podr\u00eda permitir que un atacante remoto autenticado con privilegios de solo lectura ejecute comandos SQL arbitrarios en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud manipulado a un endpoint de API REST o una interfaz de administraci\u00f3n basada en web espec\u00edficos. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante lea, modifique o elimine datos arbitrarios en una base de datos interna, lo que podr\u00eda afectar la disponibilidad del dispositivo." } ], "id": "CVE-2024-20536", "lastModified": "2025-08-07T00:23:00.243", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2024-11-06T17:15:19.140", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-sqli-CyPPAxrL" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "psirt@cisco.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-03 17:15
Modified
2025-05-07 16:08
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability in the Out-of-Band (OOB) Plug and Play (PnP) feature of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to read arbitrary files.
This vulnerability is due to an unauthenticated provisioning web server. An attacker could exploit this vulnerability through direct web requests to the provisioning server. A successful exploit could allow the attacker to read sensitive files in the PnP container that could facilitate further attacks on the PnP infrastructure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard_fabric_controller | 12.1.3 | |
cisco | nexus_dashboard_fabric_controller | 12.1.3b |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:12.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "51EE96E1-D7D3-4C58-AAA3-7A2C29B4F283", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:12.1.3b:*:*:*:*:*:*:*", "matchCriteriaId": "CE6758BE-3518-42AF-8355-041879D1AD17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Out-of-Band (OOB) Plug and Play (PnP) feature of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to read arbitrary files.\r\n\r This vulnerability is due to an unauthenticated provisioning web server. An attacker could exploit this vulnerability through direct web requests to the provisioning server. A successful exploit could allow the attacker to read sensitive files in the PnP container that could facilitate further attacks on the PnP infrastructure." }, { "lang": "es", "value": "Una vulnerabilidad en la funci\u00f3n Plug and Play (PnP) fuera de banda (OOB) de Cisco Nexus Dashboard Fabric Controller (NDFC) podr\u00eda permitir que un atacante remoto no autenticado lea archivos arbitrarios. Esta vulnerabilidad se debe a un servidor web de aprovisionamiento no autenticado. Un atacante podr\u00eda aprovechar esta vulnerabilidad mediante solicitudes web directas al servidor de aprovisionamiento. Un exploit exitoso podr\u00eda permitir al atacante leer archivos confidenciales en el contenedor PnP, lo que podr\u00eda facilitar futuros ataques a la infraestructura PnP." } ], "id": "CVE-2024-20348", "lastModified": "2025-05-07T16:08:57.033", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-04-03T17:15:49.310", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-dir-trav-SSn3AYDw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-dir-trav-SSn3AYDw" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-27" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 16:00
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Summary
A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to upload or delete files on an affected device.
This vulnerability exists because of missing authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to upload files into a specific container or delete files from a specific folder within that container. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard | * | |
cisco | nexus_dashboard_fabric_controller | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "95C6368B-22DC-4DA0-BD68-90AD842E8D5A", "versionEndExcluding": "3.2\\(1e\\)", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "64448F53-1135-4A69-8FBC-100258CE76BF", "versionEndExcluding": "12.2.2", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to upload or delete files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to upload files into a specific container or delete files from a specific folder within that container. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface." }, { "lang": "es", "value": "Una vulnerabilidad en un endpoint de API REST espec\u00edfico de Cisco NDFC podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios cargue o elimine archivos en un dispositivo afectado. Esta vulnerabilidad existe debido a la falta de controles de autorizaci\u00f3n en el endpoint de API REST afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API manipuladas al endpoint afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante cargue archivos en un contenedor espec\u00edfico o elimine archivos de una carpeta espec\u00edfica dentro de ese contenedor. Esta vulnerabilidad solo afecta a un endpoint de API REST espec\u00edfico y no afecta a la interfaz de administraci\u00f3n basada en web." } ], "id": "CVE-2024-20477", "lastModified": "2024-10-08T16:00:30.167", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:17.130", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-02 17:15
Modified
2024-10-08 15:25
Severity ?
6.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Summary
A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information.
This vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nexus_dashboard_fabric_controller | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E78B4AC-793B-4405-896F-31398AF7CBD2", "versionEndExcluding": "12.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information.\r\n\r\nThis vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key." }, { "lang": "es", "value": "Una vulnerabilidad en el software Cisco Nexus Dashboard Fabric Controller (NDFC), anteriormente Cisco Data Center Network Manager (DCNM), podr\u00eda permitir que un atacante con acceso a un archivo de copia de seguridad vea informaci\u00f3n confidencial. Esta vulnerabilidad se debe al almacenamiento inadecuado de informaci\u00f3n confidencial en archivos de copia de seguridad completa y de solo configuraci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad al analizar el contenido de un archivo de copia de seguridad que se genera desde un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante acceder a informaci\u00f3n confidencial, incluidas las credenciales del dispositivo conectado a NDFC, la clave privada del administrador del sitio de NDFC y la clave de cifrado del archivo de copia de seguridad programada." } ], "id": "CVE-2024-20448", "lastModified": "2024-10-08T15:25:47.053", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-02T17:15:16.597", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cidv-XvyX2wLj" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-313" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2024-20441 (GCVE-0-2024-20441)
Vulnerability from cvelistv5
Published
2024-10-02 16:53
Modified
2024-10-02 19:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-285 - Improper Authorization
Summary
A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device.
This vulnerability is due to insufficient authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to download config only or full backup files and learn sensitive configuration information. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Data Center Network Manager |
Version: 12.1(1) Version: 12.0.1a Version: 12.0.2d Version: 12.0.2f Version: 12.1.1 Version: 12.1.1e Version: 12.1.1p Version: 12.1.2e Version: 12.1.2p Version: 12.1.3b Version: 12.2.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20441", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:27:22.871119Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:27:38.899Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the\u0026nbsp;affected endpoint. A successful exploit could allow the attacker to download config only or full backup files and learn sensitive configuration information. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "Improper Authorization", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:53:32.918Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndhs-uaapi-Jh4V6zpN", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN" } ], "source": { "advisory": "cisco-sa-ndhs-uaapi-Jh4V6zpN", "defects": [ "CSCwk04220" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller Unauthorized API Endpoint Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20441", "datePublished": "2024-10-02T16:53:32.918Z", "dateReserved": "2023-11-08T15:08:07.676Z", "dateUpdated": "2024-10-02T19:27:38.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20438 (GCVE-0-2024-20438)
Vulnerability from cvelistv5
Published
2024-10-02 16:53
Modified
2024-10-02 19:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-693 - Protection Mechanism Failure
Summary
A vulnerability in the REST API endpoints of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to read or write files on an affected device.
This vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited network-admin functions such as reading device configuration information, uploading files, and modifying uploaded files.
Note: This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Data Center Network Manager |
Version: 12.1(1) Version: 12.0.1a Version: 12.0.2d Version: 12.0.2f Version: 12.1.1 Version: 12.1.1e Version: 12.1.1p Version: 12.1.2e Version: 12.1.2p Version: 12.1.3b Version: 12.2.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20438", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:03:29.049648Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:03:38.037Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the REST API endpoints of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to read or write files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited network-admin functions such as reading device configuration information, uploading files, and modifying uploaded files.\r\nNote: This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "Protection Mechanism Failure", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:53:23.486Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndhs-uaapi-Jh4V6zpN", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN" } ], "source": { "advisory": "cisco-sa-ndhs-uaapi-Jh4V6zpN", "defects": [ "CSCwj09986" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20438", "datePublished": "2024-10-02T16:53:23.486Z", "dateReserved": "2023-11-08T15:08:07.667Z", "dateUpdated": "2024-10-02T19:03:38.037Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20449 (GCVE-0-2024-20449)
Vulnerability from cvelistv5
Published
2024-10-02 16:54
Modified
2024-10-02 19:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-23 - Relative Path Traversal
Summary
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.
This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Data Center Network Manager |
Version: 12.1(1) Version: 12.0.1a Version: 12.0.2d Version: 12.0.2f Version: 12.1.1 Version: 12.1.1e Version: 12.1.1p Version: 12.1.2e Version: 12.1.2p Version: 12.1.3b Version: 12.2.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "data_center_network_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20449", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:01:03.051565Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:33:43.750Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.\r\n\r\nThis vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary\u0026nbsp;code in a specific container with the privileges of root." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "Relative Path Traversal", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:54:50.760Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndfc-ptrce-BUSHLbp", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp" } ], "source": { "advisory": "cisco-sa-ndfc-ptrce-BUSHLbp", "defects": [ "CSCwk04223" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20449", "datePublished": "2024-10-02T16:54:50.760Z", "dateReserved": "2023-11-08T15:08:07.678Z", "dateUpdated": "2024-10-02T19:33:43.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20491 (GCVE-0-2024-20491)
Vulnerability from cvelistv5
Published
2024-10-02 16:55
Modified
2024-10-02 17:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
A vulnerability in a logging function of Cisco Nexus Dashboard Insights could allow an attacker with access to a tech support file to view sensitive information.
This vulnerability exists because remote controller credentials are recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view remote controller admin credentials in clear text.
Note: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Nexus Dashboard Insights |
Version: 2.2.2.125 Version: 2.2.2.126 Version: 5.0.1.150 Version: 5.0.1.154 Version: 5.1.0.131 Version: 5.1.0.135 Version: 6.0.1 Version: 6.0.2 Version: 6.1.1 Version: 6.1.2 Version: 6.1.3 Version: 6.2.1 Version: 6.2.2 Version: 6.3.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20491", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T17:17:53.944273Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T17:26:08.329Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Nexus Dashboard Insights", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.2.2.125" }, { "status": "affected", "version": "2.2.2.126" }, { "status": "affected", "version": "5.0.1.150" }, { "status": "affected", "version": "5.0.1.154" }, { "status": "affected", "version": "5.1.0.131" }, { "status": "affected", "version": "5.1.0.135" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1.2" }, { "status": "affected", "version": "6.1.3" }, { "status": "affected", "version": "6.2.1" }, { "status": "affected", "version": "6.2.2" }, { "status": "affected", "version": "6.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a logging function of Cisco Nexus Dashboard Insights could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because remote controller credentials are recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view remote controller admin credentials in clear text.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:55:25.503Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndhs-idv-Bk8VqEDc", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc" } ], "source": { "advisory": "cisco-sa-ndhs-idv-Bk8VqEDc", "defects": [ "CSCwk96544" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Insights Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20491", "datePublished": "2024-10-02T16:55:25.503Z", "dateReserved": "2023-11-08T15:08:07.685Z", "dateUpdated": "2024-10-02T17:26:08.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20448 (GCVE-0-2024-20448)
Vulnerability from cvelistv5
Published
2024-10-02 16:54
Modified
2024-10-02 17:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-313 - Cleartext Storage in a File or on Disk
Summary
A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information.
This vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Data Center Network Manager |
Version: 11.2(1) Version: 7.0(2) Version: 10.3(2)IPFM Version: 10.1(1) Version: 7.2(3) Version: 7.2(2) Version: 7.2(1) Version: 11.0(1) Version: 10.4(1) Version: 10.2(1) Version: 7.2(2a) Version: 10.1(2) Version: 7.1(1) Version: 12.1(1) Version: 11.1(1) Version: 10.3(1) Version: 10.3(1)R(1) Version: 7.0(1) Version: 10.0(1) Version: 7.1(2) Version: 11.4(1) Version: 10.4(2) Version: 11.3(1) Version: 11.5(1) Version: 11.5(2) Version: 11.5(3) Version: 12.0.1a Version: 11.5(3a) Version: 12.0.2d Version: 12.0.2f Version: 11.5(4) Version: 12.1.1 Version: 12.1.1e Version: 12.1.1p Version: 12.1.2e Version: 12.1.2p Version: 12.1.3b Version: 12.2.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20448", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T17:18:00.355679Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T17:26:28.808Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.2(1)" }, { "status": "affected", "version": "7.0(2)" }, { "status": "affected", "version": "10.3(2)IPFM" }, { "status": "affected", "version": "10.1(1)" }, { "status": "affected", "version": "7.2(3)" }, { "status": "affected", "version": "7.2(2)" }, { "status": "affected", "version": "7.2(1)" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "10.4(1)" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "7.2(2a)" }, { "status": "affected", "version": "10.1(2)" }, { "status": "affected", "version": "7.1(1)" }, { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "11.1(1)" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.3(1)R(1)" }, { "status": "affected", "version": "7.0(1)" }, { "status": "affected", "version": "10.0(1)" }, { "status": "affected", "version": "7.1(2)" }, { "status": "affected", "version": "11.4(1)" }, { "status": "affected", "version": "10.4(2)" }, { "status": "affected", "version": "11.3(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.5(2)" }, { "status": "affected", "version": "11.5(3)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "11.5(3a)" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "11.5(4)" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information.\r\n\r\nThis vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-313", "description": "Cleartext Storage in a File or on Disk", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:54:17.748Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndfc-cidv-XvyX2wLj", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cidv-XvyX2wLj" } ], "source": { "advisory": "cisco-sa-ndfc-cidv-XvyX2wLj", "defects": [ "CSCwj87786" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller Credential Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20448", "datePublished": "2024-10-02T16:54:17.748Z", "dateReserved": "2023-11-08T15:08:07.678Z", "dateUpdated": "2024-10-02T17:26:28.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20442 (GCVE-0-2024-20442)
Vulnerability from cvelistv5
Published
2024-10-02 16:53
Modified
2024-10-02 19:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
A vulnerability in the REST API endpoints of Cisco Nexus Dashboard could allow an authenticated, low-privileged, remote attacker to perform limited Administrator actions on an affected device.
This vulnerability is due to insufficient authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions such as viewing portions of the web UI, generating config only or full backup files, and deleting tech support files. This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Nexus Dashboard |
Version: 1.1(3e) Version: 1.1(3c) Version: 1.1(3d) Version: 1.1(0d) Version: 1.1(2i) Version: 2.0(1b) Version: 1.1(2h) Version: 1.1(0c) Version: 1.1(3f) Version: 2.1(1d) Version: 2.1(1e) Version: 2.0(2g) Version: 2.0(2h) Version: 2.1(2d) Version: 2.0(1d) Version: 2.2(1h) Version: 2.2(1e) Version: 2.2(2d) Version: 2.1(2f) Version: 2.3(1c) Version: 2.3(2b) Version: 2.3(2c) Version: 2.3(2d) Version: 2.3(2e) Version: 3.0(1f) Version: 3.0(1i) Version: 3.1(1k) Version: 3.1(1l) |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20442", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:28:42.874953Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:28:58.418Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Nexus Dashboard", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.1(3e)" }, { "status": "affected", "version": "1.1(3c)" }, { "status": "affected", "version": "1.1(3d)" }, { "status": "affected", "version": "1.1(0d)" }, { "status": "affected", "version": "1.1(2i)" }, { "status": "affected", "version": "2.0(1b)" }, { "status": "affected", "version": "1.1(2h)" }, { "status": "affected", "version": "1.1(0c)" }, { "status": "affected", "version": "1.1(3f)" }, { "status": "affected", "version": "2.1(1d)" }, { "status": "affected", "version": "2.1(1e)" }, { "status": "affected", "version": "2.0(2g)" }, { "status": "affected", "version": "2.0(2h)" }, { "status": "affected", "version": "2.1(2d)" }, { "status": "affected", "version": "2.0(1d)" }, { "status": "affected", "version": "2.2(1h)" }, { "status": "affected", "version": "2.2(1e)" }, { "status": "affected", "version": "2.2(2d)" }, { "status": "affected", "version": "2.1(2f)" }, { "status": "affected", "version": "2.3(1c)" }, { "status": "affected", "version": "2.3(2b)" }, { "status": "affected", "version": "2.3(2c)" }, { "status": "affected", "version": "2.3(2d)" }, { "status": "affected", "version": "2.3(2e)" }, { "status": "affected", "version": "3.0(1f)" }, { "status": "affected", "version": "3.0(1i)" }, { "status": "affected", "version": "3.1(1k)" }, { "status": "affected", "version": "3.1(1l)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the REST API endpoints of Cisco Nexus Dashboard could allow an authenticated, low-privileged, remote attacker to perform limited Administrator actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions such as viewing portions of the web UI, generating config only or full backup files, and deleting tech support files. This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "Missing Authorization", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:53:41.383Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndhs-uaapi-Jh4V6zpN", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN" } ], "source": { "advisory": "cisco-sa-ndhs-uaapi-Jh4V6zpN", "defects": [ "CSCwk04255" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Unauthorized API Endpoints Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20442", "datePublished": "2024-10-02T16:53:41.383Z", "dateReserved": "2023-11-08T15:08:07.676Z", "dateUpdated": "2024-10-02T19:28:58.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20281 (GCVE-0-2024-20281)
Vulnerability from cvelistv5
Published
2024-04-03 16:20
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
A vulnerability in the web-based management interface of Cisco Nexus Dashboard and Cisco Nexus Dashboard hosted services could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.
This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the affected user has administrative privileges, these actions could include modifying the system configuration and creating new privileged accounts.
Note: There are internal security mechanisms in place that limit the scope of this exploit, reducing the Security Impact Rating of this vulnerability.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Data Center Network Manager |
Version: 12.1(1) Version: 12.1.1e Version: 12.1.2e Version: 12.1.3b Version: 12.0.1a Version: 12.0.2d Version: 12.0.2f |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20281", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-05T19:36:14.483327Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:22.646Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:41.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ndfccsrf-TEmZEfJ9", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfccsrf-TEmZEfJ9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" } ] }, { "product": "Cisco Nexus Dashboard", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.1(0c)" }, { "status": "affected", "version": "1.1(0d)" }, { "status": "affected", "version": "1.1(2h)" }, { "status": "affected", "version": "1.1(2i)" }, { "status": "affected", "version": "1.1(3c)" }, { "status": "affected", "version": "1.1(3d)" }, { "status": "affected", "version": "1.1(3e)" }, { "status": "affected", "version": "1.1(3f)" }, { "status": "affected", "version": "2.0(1b)" }, { "status": "affected", "version": "2.0(1d)" }, { "status": "affected", "version": "2.0(2g)" }, { "status": "affected", "version": "2.0(2h)" }, { "status": "affected", "version": "2.1(1d)" }, { "status": "affected", "version": "2.1(1e)" }, { "status": "affected", "version": "2.1(2d)" }, { "status": "affected", "version": "2.1(2f)" }, { "status": "affected", "version": "2.2(1e)" }, { "status": "affected", "version": "2.2(1h)" }, { "status": "affected", "version": "2.2(2d)" }, { "status": "affected", "version": "2.3(1c)" }, { "status": "affected", "version": "2.3(2b)" }, { "status": "affected", "version": "2.3(2c)" }, { "status": "affected", "version": "2.3(2d)" }, { "status": "affected", "version": "2.3(2e)" }, { "status": "affected", "version": "3.0(1f)" } ] }, { "product": "Cisco Nexus Dashboard Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Nexus Dashboard Insights", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.2.2.125" }, { "status": "affected", "version": "2.2.2.126" }, { "status": "affected", "version": "5.0.1.150" }, { "status": "affected", "version": "5.0.1.154" }, { "status": "affected", "version": "5.1.0.131" }, { "status": "affected", "version": "5.1.0.135" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1.2" }, { "status": "affected", "version": "6.1.3" }, { "status": "affected", "version": "6.3.1" }, { "status": "affected", "version": "6.2.1" }, { "status": "affected", "version": "6.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Nexus Dashboard and Cisco Nexus Dashboard hosted services could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the affected user has administrative privileges, these actions could include modifying the system configuration and creating new privileged accounts.\r\n\r Note: There are internal security mechanisms in place that limit the scope of this exploit, reducing the Security Impact Rating of this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-03T16:20:04.470Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndfccsrf-TEmZEfJ9", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfccsrf-TEmZEfJ9" } ], "source": { "advisory": "cisco-sa-ndfccsrf-TEmZEfJ9", "defects": [ "CSCwf16632", "CSCwh13498", "CSCwh00221", "CSCwh00212" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20281", "datePublished": "2024-04-03T16:20:04.470Z", "dateReserved": "2023-11-08T15:08:07.626Z", "dateUpdated": "2024-08-01T21:59:41.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20432 (GCVE-0-2024-20432)
Vulnerability from cvelistv5
Published
2024-10-02 16:53
Modified
2024-10-02 19:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
A vulnerability in the REST API and web UI of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to perform a command injection attack against an affected device.
This vulnerability is due to improper user authorization and insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted commands to an affected REST API endpoint or through the web UI. A successful exploit could allow the attacker to execute arbitrary commands on the CLI of a Cisco NDFC-managed device with network-admin privileges.
Note: This vulnerability does not affect Cisco NDFC when it is configured for storage area network (SAN) controller deployment.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Data Center Network Manager |
Version: 12.1(1) Version: 12.0.1a Version: 12.0.2d Version: 12.0.2f Version: 12.1.1 Version: 12.1.1e Version: 12.1.1p Version: 12.1.2e Version: 12.1.2p Version: 12.1.3b Version: 12.2.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "data_center_network_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20432", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:01:38.795750Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:49:19.807Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the REST API and web UI of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to perform a command injection attack against an affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to improper user authorization and insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted commands to an affected REST API endpoint or through the web UI. A successful exploit could allow the attacker to execute arbitrary commands on the CLI of a Cisco NDFC-managed device with network-admin privileges.\r\n\u0026nbsp;\r\nNote: This vulnerability does not affect Cisco NDFC when it is configured for storage area network (SAN) controller deployment." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:53:15.038Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndfc-cmdinj-UvYZrKfr", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cmdinj-UvYZrKfr" } ], "source": { "advisory": "cisco-sa-ndfc-cmdinj-UvYZrKfr", "defects": [ "CSCwj10299" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller Web UI Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20432", "datePublished": "2024-10-02T16:53:15.038Z", "dateReserved": "2023-11-08T15:08:07.667Z", "dateUpdated": "2024-10-02T19:49:19.807Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20348 (GCVE-0-2024-20348)
Vulnerability from cvelistv5
Published
2024-04-03 16:25
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-27 - Path Traversal
Summary
A vulnerability in the Out-of-Band (OOB) Plug and Play (PnP) feature of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to read arbitrary files.
This vulnerability is due to an unauthenticated provisioning web server. An attacker could exploit this vulnerability through direct web requests to the provisioning server. A successful exploit could allow the attacker to read sensitive files in the PnP container that could facilitate further attacks on the PnP infrastructure.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Data Center Network Manager |
Version: 12.1.3b |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20348", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-03T18:12:01.478507Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:12.463Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:41.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ndfc-dir-trav-SSn3AYDw", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-dir-trav-SSn3AYDw" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1.3b" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Out-of-Band (OOB) Plug and Play (PnP) feature of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to read arbitrary files.\r\n\r This vulnerability is due to an unauthenticated provisioning web server. An attacker could exploit this vulnerability through direct web requests to the provisioning server. A successful exploit could allow the attacker to read sensitive files in the PnP container that could facilitate further attacks on the PnP infrastructure." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-27", "description": "Path Traversal", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-03T16:25:38.367Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndfc-dir-trav-SSn3AYDw", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-dir-trav-SSn3AYDw" } ], "source": { "advisory": "cisco-sa-ndfc-dir-trav-SSn3AYDw", "defects": [ "CSCwi75139" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20348", "datePublished": "2024-04-03T16:25:38.367Z", "dateReserved": "2023-11-08T15:08:07.646Z", "dateUpdated": "2024-08-01T21:59:41.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20536 (GCVE-0-2024-20536)
Vulnerability from cvelistv5
Published
2024-11-06 16:31
Modified
2024-11-09 04:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
A vulnerability in a REST API endpoint and web-based management interface of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with read-only privileges to execute arbitrary SQL commands on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a specific REST API endpoint or web-based management interface. A successful exploit could allow the attacker to read, modify, or delete arbitrary data on an internal database, which could affect the availability of the device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Data Center Network Manager |
Version: 12.1.2e Version: 12.1.2p Version: 12.1.3b |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:data_center_network_manager:12.1.2e:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "data_center_network_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "12.1.2e" } ] }, { "cpes": [ "cpe:2.3:a:cisco:data_center_network_manager:12.1.2p:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "data_center_network_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "12.1.2p" } ] }, { "cpes": [ "cpe:2.3:a:cisco:data_center_network_manager:12.1.3b:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "data_center_network_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "12.1.3b" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20536", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-09T04:55:53.544Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a REST API endpoint and web-based management interface of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with read-only privileges to execute arbitrary SQL commands on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a specific REST API endpoint or web-based management interface. A successful exploit could allow the attacker to read, modify, or delete arbitrary data on an internal database, which could affect the availability of the device.\u0026nbsp;" } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-06T16:31:38.476Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndfc-sqli-CyPPAxrL", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-sqli-CyPPAxrL" } ], "source": { "advisory": "cisco-sa-ndfc-sqli-CyPPAxrL", "defects": [ "CSCwm50506" ], "discovery": "EXTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller SQL Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20536", "datePublished": "2024-11-06T16:31:38.476Z", "dateReserved": "2023-11-08T15:08:07.693Z", "dateUpdated": "2024-11-09T04:55:53.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20444 (GCVE-0-2024-20444)
Vulnerability from cvelistv5
Published
2024-10-02 16:54
Modified
2024-10-02 19:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Summary
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device.
This vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Data Center Network Manager |
Version: 11.2(1) Version: 7.0(2) Version: 10.3(2)IPFM Version: 10.1(1) Version: 7.2(3) Version: 7.2(2) Version: 7.2(1) Version: 11.0(1) Version: 10.4(1) Version: 10.2(1) Version: 7.2(2a) Version: 10.1(2) Version: 7.1(1) Version: 12.1(1) Version: 11.1(1) Version: 10.3(1) Version: 10.3(1)R(1) Version: 7.0(1) Version: 10.0(1) Version: 7.1(2) Version: 11.4(1) Version: 10.4(2) Version: 11.3(1) Version: 11.5(1) Version: 11.5(2) Version: 11.5(3) Version: 12.0.1a Version: 11.5(3a) Version: 12.0.2d Version: 12.0.2f Version: 11.5(4) Version: 12.1.1 Version: 12.1.1e Version: 12.1.1p Version: 12.1.2e Version: 12.1.2p Version: 12.1.3b Version: 12.2.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "data_center_network_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "11.2(1)" }, { "status": "affected", "version": "7.0(2)" }, { "status": "affected", "version": "10.3(2)IPFM" }, { "status": "affected", "version": "10.1(1)" }, { "status": "affected", "version": "7.2(3)" }, { "status": "affected", "version": "7.2(2)" }, { "status": "affected", "version": "7.2(1)" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "10.4(1)" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "7.2(2a)" }, { "status": "affected", "version": "10.1(2)" }, { "status": "affected", "version": "7.1(1)" }, { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "11.1(1)" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.3(1)R(1)" }, { "status": "affected", "version": "7.0(1)" }, { "status": "affected", "version": "10.0(1)" }, { "status": "affected", "version": "7.1(2)" }, { "status": "affected", "version": "11.4(1)" }, { "status": "affected", "version": "10.4(2)" }, { "status": "affected", "version": "11.3(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.5(2)" }, { "status": "affected", "version": "11.5(3)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "11.5(3a)" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "11.5(4)" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20444", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:29:46.344080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:45:29.694Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "11.2(1)" }, { "status": "affected", "version": "7.0(2)" }, { "status": "affected", "version": "10.3(2)IPFM" }, { "status": "affected", "version": "10.1(1)" }, { "status": "affected", "version": "7.2(3)" }, { "status": "affected", "version": "7.2(2)" }, { "status": "affected", "version": "7.2(1)" }, { "status": "affected", "version": "11.0(1)" }, { "status": "affected", "version": "10.4(1)" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "7.2(2a)" }, { "status": "affected", "version": "10.1(2)" }, { "status": "affected", "version": "7.1(1)" }, { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "11.1(1)" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.3(1)R(1)" }, { "status": "affected", "version": "7.0(1)" }, { "status": "affected", "version": "10.0(1)" }, { "status": "affected", "version": "7.1(2)" }, { "status": "affected", "version": "11.4(1)" }, { "status": "affected", "version": "10.4(2)" }, { "status": "affected", "version": "11.3(1)" }, { "status": "affected", "version": "11.5(1)" }, { "status": "affected", "version": "11.5(2)" }, { "status": "affected", "version": "11.5(3)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "11.5(3a)" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "11.5(4)" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device.\r\n\u0026nbsp;\r\nThis vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:54:09.855Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndfc-raci-T46k3jnN", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-raci-T46k3jnN" } ], "source": { "advisory": "cisco-sa-ndfc-raci-T46k3jnN", "defects": [ "CSCwj55173" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller REST API Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20444", "datePublished": "2024-10-02T16:54:09.855Z", "dateReserved": "2023-11-08T15:08:07.677Z", "dateUpdated": "2024-10-02T19:45:29.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20477 (GCVE-0-2024-20477)
Vulnerability from cvelistv5
Published
2024-10-02 16:55
Modified
2024-10-02 17:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to upload or delete files on an affected device.
This vulnerability exists because of missing authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to upload files into a specific container or delete files from a specific folder within that container. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Data Center Network Manager |
Version: 12.1(1) Version: 12.0.1a Version: 12.0.2d Version: 12.0.2f Version: 12.1.1 Version: 12.1.1e Version: 12.1.1p Version: 12.1.2e Version: 12.1.2p Version: 12.1.3b Version: 12.2.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20477", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T17:17:57.942531Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T17:26:21.782Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" }, { "status": "affected", "version": "12.1.1" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to upload or delete files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to upload files into a specific container or delete files from a specific folder within that container. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "Missing Authorization", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:55:07.208Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndhs-uaapi-Jh4V6zpN", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN" } ], "source": { "advisory": "cisco-sa-ndhs-uaapi-Jh4V6zpN", "defects": [ "CSCwk11265" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller Unauthorized REST API Endpoint Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20477", "datePublished": "2024-10-02T16:55:07.208Z", "dateReserved": "2023-11-08T15:08:07.682Z", "dateUpdated": "2024-10-02T17:26:21.782Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20490 (GCVE-0-2024-20490)
Vulnerability from cvelistv5
Published
2024-10-02 16:55
Modified
2024-10-02 17:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
A vulnerability in a logging function of Cisco Nexus Dashboard Fabric Controller (NDFC) and Cisco Nexus Dashboard Orchestrator (NDO) could allow an attacker with access to a tech support file to view sensitive information.
This vulnerability exists because HTTP proxy credentials could be recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view HTTP proxy server admin credentials in clear text that are configured on Nexus Dashboard to reach an external network.
Note: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco Data Center Network Manager |
Version: 12.1.1e Version: 12.1.1p Version: 12.1.2e Version: 12.1.2p Version: 12.1.3b Version: 12.2.1 Version: 12.2.2 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20490", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T17:17:55.986708Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T17:26:15.286Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" }, { "status": "affected", "version": "12.2.2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Nexus Dashboard Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0(1i)" }, { "status": "affected", "version": "1.0(2b)" }, { "status": "affected", "version": "3.7(1d)" }, { "status": "affected", "version": "3.7(1g)" }, { "status": "affected", "version": "3.7(1h)" }, { "status": "affected", "version": "3.7(1j)" }, { "status": "affected", "version": "3.7(1i)" }, { "status": "affected", "version": "3.7(1k)" }, { "status": "affected", "version": "3.7(1l)" }, { "status": "affected", "version": "3.7(2d)" }, { "status": "affected", "version": "3.7(2e)" }, { "status": "affected", "version": "3.7(2f)" }, { "status": "affected", "version": "3.7(2g)" }, { "status": "affected", "version": "3.7(2h)" }, { "status": "affected", "version": "4.1(2e)" }, { "status": "affected", "version": "3.7(2i)" }, { "status": "affected", "version": "4.1(2h)" }, { "status": "affected", "version": "4.2(1d)" }, { "status": "affected", "version": "4.2(1e)" }, { "status": "affected", "version": "4.2(2e)" }, { "status": "affected", "version": "4.2(3e)" }, { "status": "affected", "version": "4.3.(1.1008)" }, { "status": "affected", "version": "4.2(3j)" }, { "status": "affected", "version": "4.2(3k)" }, { "status": "affected", "version": "4.4(1.1009)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a logging function of Cisco Nexus Dashboard Fabric Controller (NDFC) and Cisco Nexus Dashboard Orchestrator (NDO) could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because HTTP proxy credentials could be recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view HTTP proxy server admin credentials in clear text that are configured on Nexus Dashboard to reach an external network.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:55:15.650Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndhs-idv-Bk8VqEDc", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc" } ], "source": { "advisory": "cisco-sa-ndhs-idv-Bk8VqEDc", "defects": [ "CSCwk96526" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller and Nexus Dashboard Orchestrator Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20490", "datePublished": "2024-10-02T16:55:15.650Z", "dateReserved": "2023-11-08T15:08:07.685Z", "dateUpdated": "2024-10-02T17:26:15.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }