A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.
This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp | Vendor Advisory |
Configurations
History
08 Oct 2024, 15:33
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco
Cisco nexus Dashboard Fabric Controller |
|
CPE | cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:* | |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp - Vendor Advisory | |
CWE | CWE-22 |
04 Oct 2024, 13:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-02 17:15
Updated : 2024-10-08 15:33
NVD link : CVE-2024-20449
Mitre link : CVE-2024-20449
CVE.ORG link : CVE-2024-20449
JSON object : View
Products Affected
cisco
- nexus_dashboard_fabric_controller