First published: Thu Jul 21 2022(Updated: )
A vulnerability in Cisco Nexus Dashboard could allow an authenticated, remote attacker to write arbitrary files on an affected device. This vulnerability is due to insufficient input validation in the web-based management interface of Cisco Nexus Dashboard. An attacker with Administrator credentials could exploit this vulnerability by uploading a crafted file. A successful exploit could allow the attacker to overwrite arbitrary files on an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard | >=2.0<2.2\(1e\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-20913.
The severity level of CVE-2022-20913 is medium.
The affected software for CVE-2022-20913 is Cisco Nexus Dashboard.
An attacker with Administrator credentials can exploit CVE-2022-20913 by using the web-based management interface of Cisco Nexus Dashboard to write arbitrary files on an affected device.
You can find more information about CVE-2022-20913 on the Cisco Security Advisory: [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-afw-2MT9tb99).