First published: Wed Oct 02 2024(Updated: )
A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device. This vulnerability is due to insufficient authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to download config only or full backup files and learn sensitive configuration information. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard Software | <3.2\(1e\) | |
Cisco Nexus Dashboard Fabric Controller | >=12.0.0<12.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20441 has a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2024-20441, update to the latest version of Cisco Nexus Dashboard or Nexus Dashboard Fabric Controller that includes the necessary security patches.
CVE-2024-20441 affects Cisco Nexus Dashboard and Cisco Nexus Dashboard Fabric Controller versions that do not have the required authorization controls.
CVE-2024-20441 exploits insufficient authorization controls in a REST API endpoint, allowing low-privileged attackers to access sensitive information.
Yes, the attacker must be authenticated, albeit with low privileges, to exploit CVE-2024-20441.