THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-20282

Assignercisco
Reserved2023-11-08
Published2024-04-03
Updated2024-04-03

Description

A vulnerability in Cisco Nexus Dashboard could allow an authenticated, local attacker with valid rescue-user credentials to elevate privileges to root on an affected device. This vulnerability is due to insufficient protections for a sensitive access token. An attacker could exploit this vulnerability by using this token to access resources within the device infrastructure. A successful exploit could allow an attacker to gain root access to the filesystem or hosted containers on an affected device.



MEDIUM: 6.0CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Privilege Management

Product status

1.1(0c)
affected

1.1(0d)
affected

1.1(2h)
affected

1.1(2i)
affected

1.1(3c)
affected

1.1(3d)
affected

1.1(3e)
affected

1.1(3f)
affected

2.0(1b)
affected

2.0(1d)
affected

2.0(2g)
affected

2.0(2h)
affected

2.1(1d)
affected

2.1(1e)
affected

2.1(2d)
affected

2.1(2f)
affected

2.2(1e)
affected

2.2(1h)
affected

2.2(2d)
affected

2.3(1c)
affected

2.3(2b)
affected

2.3(2c)
affected

2.3(2d)
affected

2.3(2e)
affected

3.0(1f)
affected

3.0(1i)
affected

References

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH (cisco-sa-ndru-pesc-kZ2PQLZH)

cve.org CVE-2024-20282

nvd.nist.gov CVE-2024-20282

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-20282
© Copyright 2024 THREATINT. Made in Cyprus with +