Cisco Network Services Orchestrator vulnerabilities
11 known vulnerabilities affecting cisco/network_services_orchestrator.
Total CVEs
11
CISA KEV
2
actively exploited
Public exploits
2
Exploited in wild
1
Severity breakdown
CRITICAL2HIGH6MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2025-32433CRITICALCVSS 10.0KEVPoCfixed in 5.7.19.1≥ 5.8, < 6.1.16.2+4 more2025-04-16
CVE-2025-32433 [CRITICAL] CWE-306 CVE-2025-32433: Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3,
Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems a
nvd
CVE-2021-1132HIGHCVSS 7.5v5.3.1v5.4+2 more2024-11-18
CVE-2021-1132 [MEDIUM] CWE-35 CVE-2021-1132: A vulnerability in the API subsystem and in the web-management interface of Cisco Network Servi
A vulnerability in the API subsystem and in the web-management interface of Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to access sensitive data.
This vulnerability exists because the web-management interface and certain HTTP-based APIs do not properly validate user-supplied input. An attacker could exploit
nvd
CVE-2024-20381HIGHCVSS 8.8v4.4.1v4.5.1+161 more2024-09-11
CVE-2024-20381 [HIGH] CWE-285 CVE-2024-20381: A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) a
A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.
This
nvd
CVE-2024-20366HIGHCVSS 7.8≥ 5.0, < 5.0.5≥ 6.0, < 6.0.22024-05-15
CVE-2024-20366 [HIGH] CWE-73 CVE-2024-20366: A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco
A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.
This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker
nvd
CVE-2024-20369MEDIUMCVSS 6.1≥ 5.4, < 5.5.10.1≥ 5.6, < 5.6.14.3+5 more2024-05-15
CVE-2024-20369 [MEDIUM] CWE-601 CVE-2024-20369: A vulnerability in the web-based management interface of Cisco Crosswork Network Services Orchestrat
A vulnerability in the web-based management interface of Cisco Crosswork Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.
This vulnerability is due to improper input validation of a parameter in an HTTP request. An attacker could exploit this vulnerability by persuading
nvd
CVE-2023-20040MEDIUMCVSS 5.5≥ 3.3, < 5.4.7≥ 5.5, < 5.5.6+3 more2023-01-20
CVE-2023-20040 [MEDIUM] CWE-23 CVE-2023-20040: A vulnerability in the NETCONF service of Cisco Network Services Orchestrator (NSO) could allow an a
A vulnerability in the NETCONF service of Cisco Network Services Orchestrator (NSO) could allow an authenticated, remote attacker to cause a denial of service (DoS) on an affected system that is running as the root user. To exploit this vulnerability, the attacker must be a member of the admin group.
This vulnerability exists because user-supplied in
nvd
CVE-2021-44228CRITICALCVSS 10.0KEVPoCfixed in 5.3.5.1≥ 5.4, < 5.4.5.2+2 more2021-12-10
CVE-2021-44228 [CRITICAL] CWE-20 CVE-2021-44228: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LD
nvd
CVE-2021-1572HIGHCVSS 7.8≥ 5.4, ≤ 5.4.3.1≥ 5.5, ≤ 5.5.2.22021-08-04
CVE-2021-1572 [HIGH] CWE-266 CVE-2021-1572: A vulnerability in ConfD could allow an authenticated, local attacker to execute arbitrary commands
A vulnerability in ConfD could allow an authenticated, local attacker to execute arbitrary commands at the level of the account under which ConfD is running, which is commonly root. To exploit this vulnerability, an attacker must have a valid account on an affected device. The vulnerability exists because the affected software incorrectly runs the SFTP u
nvd
CVE-2020-3362MEDIUMCVSS 4.7fixed in 4.7.7.3≥ 5.1.0.1, < 5.1.4.22020-06-18
CVE-2020-3362 [MEDIUM] CWE-200 CVE-2020-3362: A vulnerability in the CLI of Cisco Network Services Orchestrator (NSO) could allow an authenticated
A vulnerability in the CLI of Cisco Network Services Orchestrator (NSO) could allow an authenticated, local attacker to access confidential information on an affected device. The vulnerability is due to a timing issue in the processing of CLI commands. An attacker could exploit this vulnerability by executing a specific sequence of commands on the CLI
nvd
CVE-2018-0463HIGHCVSS 7.5v1.2.02018-10-05
CVE-2018-0463 [HIGH] CWE-264 CVE-2018-0463: A vulnerability in the Cisco Network Plug and Play server component of Cisco Network Services Orches
A vulnerability in the Cisco Network Plug and Play server component of Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to gain unauthorized access to configuration data that is stored on an affected NSO system. The vulnerability exists because the Network Plug and Play component performs incomplete validation wh
nvd
CVE-2018-0274HIGHCVSS 8.8≥ 4.1, ≤ 4.1.6.0≥ 4.2, ≤ 4.2.4.0+2 more2018-06-07
CVE-2018-0274 [HIGH] CWE-20 CVE-2018-0274: A vulnerability in the CLI parser of Cisco Network Services Orchestrator (NSO) could allow an authen
A vulnerability in the CLI parser of Cisco Network Services Orchestrator (NSO) could allow an authenticated, remote attacker to execute arbitrary shell commands with the privileges of the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting malicious arguments into vulnerable comm
nvd