First published: Wed Oct 02 2024(Updated: )
A vulnerability in the REST API endpoints of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to read or write files on an affected device. This vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited network-admin functions such as reading device configuration information, uploading files, and modifying uploaded files. Note: This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard Software | <3.2\(1e\) | |
Cisco Nexus Dashboard Fabric Controller | >=12.0.0<12.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20438 is considered a medium severity vulnerability due to its potential impact on file access through the REST API.
To mitigate CVE-2024-20438, ensure that appropriate authorization controls are implemented for the impacted REST API endpoints.
CVE-2024-20438 affects users of Cisco Nexus Dashboard Software versions prior to 3.2(1e) and Cisco Nexus Dashboard Fabric Controller versions between 12.0.0 and 12.2.2.
An attacker exploiting CVE-2024-20438 could read or write files on the affected devices by leveraging unauthorized API access.
Yes, CVE-2024-20438 can be exploited by authenticated remote attackers with low privileges.