We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)
Bugpilot (Bug tracking)

Ok

THREATINT CVE Home CVE Diag Help
PUBLISHED

CVE-2024-20282

Reserved:2023-11-08
Published:2024-04-03
Updated:2024-04-03

Description

A vulnerability in Cisco Nexus Dashboard could allow an authenticated, local attacker with valid rescue-user credentials to elevate privileges to root on an affected device. This vulnerability is due to insufficient protections for a sensitive access token. An attacker could exploit this vulnerability by using this token to access resources within the device infrastructure. A successful exploit could allow an attacker to gain root access to the filesystem or hosted containers on an affected device.



MEDIUM: 6.0CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Privilege Management

Product status

1.1(0c)
affected

1.1(0d)
affected

1.1(2h)
affected

1.1(2i)
affected

1.1(3c)
affected

1.1(3d)
affected

1.1(3e)
affected

1.1(3f)
affected

2.0(1b)
affected

2.0(1d)
affected

2.0(2g)
affected

2.0(2h)
affected

2.1(1d)
affected

2.1(1e)
affected

2.1(2d)
affected

2.1(2f)
affected

2.2(1e)
affected

2.2(1h)
affected

2.2(2d)
affected

2.3(1c)
affected

2.3(2b)
affected

2.3(2c)
affected

2.3(2d)
affected

2.3(2e)
affected

3.0(1f)
affected

3.0(1i)
affected

References

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH (cisco-sa-ndru-pesc-kZ2PQLZH)

cve.org CVE-2024-20282

nvd.nist.gov CVE-2024-20282

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-20282