CVE-2024-20282

A vulnerability in Cisco Nexus Dashboard could allow an authenticated, local attacker with valid rescue-user credentials to elevate privileges to root on an affected device. This vulnerability is due to insufficient protections for a sensitive access token. An attacker could exploit this vulnerability by using this token to access resources within the device infrastructure. A successful exploit could allow an attacker to gain root access to the filesystem or hosted containers on an affected device.
Configurations

No configuration.

History

21 Nov 2024, 08:52

Type Values Removed Values Added
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH -
Summary
  • (es) Una vulnerabilidad en Cisco Nexus Dashboard podría permitir que un atacante local autenticado con credenciales válidas de usuario de rescate eleve los privilegios a root en un dispositivo afectado. Esta vulnerabilidad se debe a protecciones insuficientes para un token de acceso confidencial. Un atacante podría aprovechar esta vulnerabilidad utilizando este token para acceder a recursos dentro de la infraestructura del dispositivo. Un exploit exitoso podría permitir a un atacante obtener acceso raíz al SYSTEM de archivos o a los contenedores alojados en un dispositivo afectado.

03 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 17:15

Updated : 2024-11-21 08:52


NVD link : CVE-2024-20282

Mitre link : CVE-2024-20282

CVE.ORG link : CVE-2024-20282


JSON object : View

Products Affected

No product.

CWE
CWE-269

Improper Privilege Management