Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-20278

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-27 Mar, 2024 | 16:59
Updated At-15 Aug, 2024 | 16:45
Rejected At-
Credits

A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:27 Mar, 2024 | 16:59
Updated At:15 Aug, 2024 | 16:45
Rejected At:
▼CVE Numbering Authority (CNA)

A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco IOS XE Software
Versions
Affected
  • 17.6.1
  • 17.6.2
  • 17.6.1w
  • 17.6.1a
  • 17.6.1x
  • 17.6.3
  • 17.6.1y
  • 17.6.1z
  • 17.6.3a
  • 17.6.4
  • 17.6.1z1
  • 17.6.5
  • 17.6.6
  • 17.6.6a
  • 17.6.5a
  • 17.7.1
  • 17.7.1a
  • 17.7.1b
  • 17.7.2
  • 17.10.1
  • 17.10.1a
  • 17.10.1b
  • 17.8.1
  • 17.8.1a
  • 17.9.1
  • 17.9.1w
  • 17.9.2
  • 17.9.1a
  • 17.9.1x
  • 17.9.1y
  • 17.9.3
  • 17.9.2a
  • 17.9.1x1
  • 17.9.3a
  • 17.9.4
  • 17.9.1y1
  • 17.9.4a
  • 17.11.1
  • 17.11.1a
  • 17.12.1
  • 17.12.1w
  • 17.12.1a
  • 17.11.99SW
Problem Types
TypeCWE IDDescription
cweCWE-184Incomplete List of Disallowed Inputs
Type: cwe
CWE ID: CWE-184
Description: Incomplete List of Disallowed Inputs
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX
x_transferred
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
Cisco Systems, Inc.cisco
Product
ios_xe
CPEs
  • cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 17.6.1
  • 17.6.2
  • 17.6.1w
  • 17.6.1a
  • 17.6.1x
  • 17.6.3
  • 17.6.1y
  • 17.6.1z
  • 17.6.3a
  • 17.6.4
  • 17.6.1z1
  • 17.6.5
  • 17.6.6
  • 17.6.6a
  • 17.6.5a
  • 17.7.1
  • 17.7.1a
  • 17.7.1b
  • 17.7.2
  • 17.10.1
  • 17.10.1a
  • 17.10.1b
  • 17.8.1
  • 17.8.1a
  • 17.9.1
  • 17.9.1w
  • 17.9.2
  • 17.9.1a
  • 17.9.1x
  • 17.9.1y
  • 17.9.3
  • 17.9.2a
  • 17.9.1x1
  • 17.9.3a
  • 17.9.4
  • 17.9.1y1
  • 17.9.4a
  • 17.11.1
  • 17.11.1a
  • 17.12.1
  • 17.12.1w
  • 17.12.1a
  • 17.11.99sw
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@cisco.com
Published At:27 Mar, 2024 | 17:15
Updated At:01 Aug, 2025 | 15:22

A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.1
cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.1a
cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.1w
cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.1x
cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.1y
cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.1z
cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.1z1
cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.2
cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.3
cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.3a
cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.4
cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.5
cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.5a
cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.6
cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.6.6a
cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.7.1
cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.7.1a
cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.7.1b
cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.7.2
cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.8.1
cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.8.1a
cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.1
cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.1a
cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.1w
cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.1x
cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.1x1
cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.1y
cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.1y1
cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.2
cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.2a
cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.3
cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.3a
cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.4
cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.9.4a
cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.10.1
cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.10.1a
cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.10.1b
cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.11.1
cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.11.1a
cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.11.99sw
cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.12.1
cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.12.1a
cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>17.12.1w
cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-184Secondarypsirt@cisco.com
CWE ID: CWE-184
Type: Secondary
Source: psirt@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLXpsirt@cisco.com
Vendor Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLXaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

56Records found

CVE-2021-1385
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.41% / 60.75%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:07
Updated-08 Nov, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOx Application Environment Path Traversal Vulnerability

A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-20478
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.83%
||
7 Day CHG~0.00%
Published-28 Aug, 2024 | 16:30
Updated-01 Aug, 2025 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability

A vulnerability in the software upgrade component of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Network Controller, formerly Cisco Cloud APIC, could allow an authenticated, remote attacker with Administrator-level privileges to install a modified software image, leading to arbitrary code injection on an affected system. This vulnerability is due to insufficient signature validation of software images. An attacker could exploit this vulnerability by installing a modified software image. A successful exploit could allow the attacker to execute arbitrary code on the affected system and elevate their privileges to root. Note: Administrators should always validate the hash of any upgrade image before uploading it to Cisco APIC and Cisco Cloud Network Controller.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-application_policy_infrastructure_controllerCisco Application Policy Infrastructure Controller (APIC)application_policy_infrastructure_controller
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2021-1255
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.17% / 38.93%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 19:58
Updated-12 Nov, 2024 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager REST API Vulnerabilities

Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-184
Incomplete List of Disallowed Inputs
CVE-2021-1135
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.17% / 38.93%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 20:11
Updated-12 Nov, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager REST API Vulnerabilities

Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-184
Incomplete List of Disallowed Inputs
CVE-2020-3384
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.2||HIGH
EPSS-0.49% / 64.53%
||
7 Day CHG~0.00%
Published-31 Jul, 2020 | 00:00
Updated-13 Nov, 2024 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager Command Injection Vulnerability

A vulnerability in specific REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system with the privileges of the logged-in user. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to inject arbitrary commands on the underlying operating system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-184
Incomplete List of Disallowed Inputs
CVE-2021-1133
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.35% / 57.00%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 19:35
Updated-12 Nov, 2024 | 20:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager REST API Vulnerabilities

Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-184
Incomplete List of Disallowed Inputs
  • Previous
  • 1
  • 2
  • Next
Details not found