CVE-2024-20381

CWE-2854 documents4 sources
Severity
8.8HIGH
EPSS
1.9%
top 16.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 11

Description

A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device. This vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or dev

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5cisco/cisco_network_services_orchestrator163 versions+162
NVDcisco/ios_xr88 versions+87
CVEListV5cisco/cisco_ios_xr_software88 versions+87

🔴Vulnerability Details

2
GHSA
GHSA-rg27-7v3v-xmhh: A vulnerability in the JSON-RPC API feature in ConfD that is used by the web-based management interfaces of Cisco Crosswork Network Services Orchestra2024-09-11
CVEList
Cisco Network Services Orchestrator Configuration Update Authorization Bypass Vulnerability2024-09-11

📋Vendor Advisories

1
Cisco
Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability2024-09-11
CVE-2024-20381 (HIGH CVSS 8.8) | A vulnerability in the JSON-RPC API | cvebase.io