A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.
This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.
References
Configurations
No configuration.
History
15 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-15 18:15
Updated : 2024-05-15 18:35
NVD link : CVE-2024-20366
Mitre link : CVE-2024-20366
CVE.ORG link : CVE-2024-20366
JSON object : View
Products Affected
No product.
CWE
CWE-73
External Control of File Name or Path