This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-18164 | A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device. This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root. |
Tue, 08 Oct 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco nexus Dashboard Fabric Controller
|
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cisco nexus Dashboard Fabric Controller
|
Wed, 02 Oct 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco data Center Network Manager |
|
| CPEs | cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cisco
Cisco data Center Network Manager |
|
| Metrics |
ssvc
|
Wed, 02 Oct 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device. This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root. | |
| Title | Cisco Nexus Dashboard Fabric Controller Remote Code Execution Vulnerability | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-02T19:33:43.750Z
Reserved: 2023-11-08T15:08:07.678Z
Link: CVE-2024-20449
Updated: 2024-10-02T19:26:46.137Z
Status : Analyzed
Published: 2024-10-02T17:15:16.820
Modified: 2024-10-08T15:33:29.210
Link: CVE-2024-20449
No data.
OpenCVE Enrichment
No data.
EUVD