CVE-2024-20389

A vulnerability in the ConfD CLI and the Cisco Crosswork Network Services Orchestrator CLI could allow an authenticated, low-privileged, local attacker to read and write arbitrary files as root on the underlying operating system. This vulnerability is due to improper authorization enforcement when specific CLI commands are used. An attacker could exploit this vulnerability by executing an affected CLI command with crafted arguments. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system with the privileges of the root user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:crosswork_network_services_orchestrator:6.2.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:cisco:crosswork_network_services_orchestrator:6.0.11:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:cisco:confd_basic:8.0.11:*:*:*:*:*:*:*

History

30 Jul 2025, 19:17

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:crosswork_network_services_orchestrator:6.0.11:*:*:*:*:*:*:*
cpe:2.3:a:cisco:crosswork_network_services_orchestrator:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:confd_basic:8.0.11:*:*:*:*:*:*:*
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8 - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8 - Vendor Advisory
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f - Vendor Advisory
First Time Cisco
Cisco crosswork Network Services Orchestrator
Cisco confd Basic

21 Nov 2024, 08:52

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad en la CLI de ConfD y la CLI de Cisco Crosswork Network Services Orchestrator podría permitir que un atacante local autenticado y con pocos privilegios lea y escriba archivos arbitrarios como usuario root en el sistema operativo subyacente. Esta vulnerabilidad se debe a una aplicación incorrecta de la autorización cuando se utilizan comandos CLI específicos. Un atacante podría aprovechar esta vulnerabilidad ejecutando un comando CLI afectado con argumentos creados. Una explotación exitosa podría permitir al atacante leer o escribir archivos arbitrarios en el sistema operativo subyacente con los privilegios del usuario root.
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8 - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cnfd-rwpesc-ZAOufyx8 -
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-rwpesc-qrQGnh3f -

16 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-16 14:15

Updated : 2025-07-30 19:17


NVD link : CVE-2024-20389

Mitre link : CVE-2024-20389

CVE.ORG link : CVE-2024-20389


JSON object : View

Products Affected

cisco

  • confd_basic
  • crosswork_network_services_orchestrator
CWE
CWE-266

Incorrect Privilege Assignment