Severity
6.0MEDIUM
EPSS
0.1%
top 83.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3

Description

A vulnerability in Cisco Nexus Dashboard could allow an authenticated, local attacker with valid rescue-user credentials to elevate privileges to root on an affected device. This vulnerability is due to insufficient protections for a sensitive access token. An attacker could exploit this vulnerability by using this token to access resources within the device infrastructure. A successful exploit could allow an attacker to gain root access to the filesystem or hosted containers on an affected devi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:NExploitability: 0.8 | Impact: 5.2

Affected Packages2 packages

NVDcisco/nexus_dashboard< 3.1(1k)
CVEListV5cisco/cisco_nexus_dashboard26 versions+25

🔴Vulnerability Details

2
GHSA
GHSA-mg3q-349p-vcpv: A vulnerability in Cisco Nexus Dashboard could allow an authenticated, local attacker with valid rescue-user credentials to elevate privileges to root2024-04-03
CVEList
CVE-2024-20282: A vulnerability in Cisco Nexus Dashboard could allow an authenticated, local attacker with valid rescue-user credentials to elevate privileges to root2024-04-03

📋Vendor Advisories

1
Cisco
Cisco Nexus Dashboard Privilege Escalation Vulnerability2024-04-03