CVE-2022-20913

A vulnerability in Cisco Nexus Dashboard could allow an authenticated, remote attacker to write arbitrary files on an affected device. This vulnerability is due to insufficient input validation in the web-based management interface of Cisco Nexus Dashboard. An attacker with Administrator credentials could exploit this vulnerability by uploading a crafted file. A successful exploit could allow the attacker to overwrite arbitrary files on an affected device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*

History

29 Jul 2022, 12:38

Type Values Removed Values Added
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-afw-2MT9tb99 - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-afw-2MT9tb99 - Vendor Advisory
CWE CWE-20
CPE cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

22 Jul 2022, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-22 04:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-20913

Mitre link : CVE-2022-20913

CVE.ORG link : CVE-2022-20913


JSON object : View

Products Affected

cisco

  • nexus_dashboard
CWE
CWE-20

Improper Input Validation

CWE-23

Relative Path Traversal