CVE-2022-20909

Multiple vulnerabilities in Cisco Nexus Dashboard could allow an authenticated, local attacker to elevate privileges on an affected device. These vulnerabilities are due to insufficient input validation during CLI command execution on an affected device. An attacker could exploit these vulnerabilities by authenticating as the rescue-user and executing vulnerable CLI commands using a malicious payload. A successful exploit could allow the attacker to elevate privileges to root on an affected device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*

History

29 Jul 2022, 13:12

Type Values Removed Values Added
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mprvesc-EMhDgXe5 - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mprvesc-EMhDgXe5 - Vendor Advisory
First Time Cisco nexus Dashboard
Cisco
CPE cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
CWE CWE-20

22 Jul 2022, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-22 04:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-20909

Mitre link : CVE-2022-20909

CVE.ORG link : CVE-2022-20909


JSON object : View

Products Affected

cisco

  • nexus_dashboard
CWE
CWE-20

Improper Input Validation

CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition