Elevated Privilege Vulnerability in Cisco Nexus Dashboard
CVE-2024-20282

6MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
3 April 2024

Badges

👾 Exploit Exists

Summary

A vulnerability in Cisco Nexus Dashboard allows authenticated local attackers with valid rescue-user credentials to elevate their privileges to root on affected devices. This issue arises from inadequate protection of a sensitive access token. By exploiting this vulnerability, attackers can utilize the access token to gain unauthorized access to essential resources within the device's infrastructure. If successfully exploited, this vulnerability can enable attackers to secure root access to the filesystem or hosted containers, posing a significant security risk.

Affected Version(s)

Cisco Nexus Dashboard 1.1(0c)

Cisco Nexus Dashboard 1.1(0d)

Cisco Nexus Dashboard 1.1(2h)

References

CVSS V3.1

Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

.