First published: Thu Jul 21 2022(Updated: )
Multiple vulnerabilities in Cisco Nexus Dashboard could allow an authenticated, local attacker to elevate privileges on an affected device. These vulnerabilities are due to insufficient input validation during CLI command execution on an affected device. An attacker could exploit these vulnerabilities by authenticating as the rescue-user and executing vulnerable CLI commands using a malicious payload. A successful exploit could allow the attacker to elevate privileges to root on an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard | >=2.0<2.2\(1e\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20906 is a vulnerability in Cisco Nexus Dashboard that could allow an authenticated local attacker to elevate privileges on an affected device.
CVE-2022-20906 has a severity value of 6.7, which is considered medium severity.
An attacker can exploit CVE-2022-20906 by taking advantage of insufficient input validation during CLI command execution on an affected device.
The affected software for CVE-2022-20906 is Cisco Nexus Dashboard version 2.0 to 2.2(1e).
You can find more information about CVE-2022-20906 in the Cisco Security Advisory: cisco-sa-ndb-mprvesc-EMhDgXe5.