First published: Wed Aug 28 2024(Updated: )
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments for a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20289 has been classified as a high severity vulnerability.
To mitigate CVE-2024-20289, apply the latest Cisco NX-OS software updates as they address the insufficient validation of arguments.
CVE-2024-20289 affects devices running certain versions of Cisco NX-OS Software that allow authenticated, low-privileged local access.
CVE-2024-20289 allows an authenticated, low-privileged local attacker to execute arbitrary commands on the underlying operating system.
CVE-2024-20289 was disclosed in early 2024.