Elevated Privilege Vulnerability in Cisco Nexus Dashboard
CVE-2024-20282
6MEDIUM
Summary
A vulnerability in Cisco Nexus Dashboard allows authenticated local attackers with valid rescue-user credentials to elevate their privileges to root on affected devices. This issue arises from inadequate protection of a sensitive access token. By exploiting this vulnerability, attackers can utilize the access token to gain unauthorized access to essential resources within the device's infrastructure. If successfully exploited, this vulnerability can enable attackers to secure root access to the filesystem or hosted containers, posing a significant security risk.
Affected Version(s)
Cisco Nexus Dashboard 1.1(0c)
Cisco Nexus Dashboard 1.1(0d)
Cisco Nexus Dashboard 1.1(2h)
References
CVSS V3.1
Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published