A vulnerability in the SSH implementation of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to impersonate Cisco NDFC-managed devices.
This vulnerability is due to insufficient SSH host key validation. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections to Cisco NDFC-managed devices, which could allow an attacker to intercept this traffic. A successful exploit could allow the attacker to impersonate a managed device and capture user credentials.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-shkv-snQJtjrp | Vendor Advisory |
Configurations
History
22 Jul 2025, 16:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:* | |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-shkv-snQJtjrp - Vendor Advisory | |
First Time |
Cisco
Cisco nexus Dashboard |
05 Jun 2025, 20:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Jun 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-04 17:15
Updated : 2025-07-22 16:58
NVD link : CVE-2025-20163
Mitre link : CVE-2025-20163
CVE.ORG link : CVE-2025-20163
JSON object : View
Products Affected
cisco
- nexus_dashboard
CWE
CWE-322
Key Exchange without Entity Authentication