First published: Wed Oct 02 2024(Updated: )
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device. This vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard Fabric Controller | <12.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20444 has been classified with a high severity level due to its potential for command injection attacks.
To fix CVE-2024-20444, users should update their Cisco Nexus Dashboard Fabric Controller to version 12.2.2 or later.
CVE-2024-20444 affects Cisco Nexus Dashboard Fabric Controller instances running versions prior to 12.2.2.
CVE-2024-20444 enables authenticated remote attackers to perform command injection attacks on affected devices.
Exploitation of CVE-2024-20444 requires the attacker to have network-admin privileges.