First published: Thu Jun 18 2020(Updated: )
A vulnerability in the CLI of Cisco Network Services Orchestrator (NSO) could allow an authenticated, local attacker to access confidential information on an affected device. The vulnerability is due to a timing issue in the processing of CLI commands. An attacker could exploit this vulnerability by executing a specific sequence of commands on the CLI. A successful exploit could allow the attacker to read configuration information that would normally be accessible to administrators only.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Network Services Orchestrator | <4.7.7.3 | |
Cisco Network Services Orchestrator | >=5.1.0.1<5.1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-3362.
The affected software is Cisco Network Services Orchestrator (NSO) versions up to 4.7.7.3 and versions between 5.1.0.1 and 5.1.4.2.
The severity of CVE-2020-3362 is medium (4.7 on a scale of 10).
An attacker can exploit this vulnerability by leveraging a timing issue in the processing of CLI commands to gain access to confidential information on an affected device.
You can find more information about CVE-2020-3362 in Cisco's Security Advisory at the following link: [link to Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-info-disclosure-WdNvBTNq).