This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco Nexus Dashboard Fabric Controller. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the AMF protocol. Crafted data in an AMF protocol message can trigger the deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the fmserver user.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard Fabric Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-14805 is critical due to its ability to allow remote code execution by unauthenticated attackers.
To fix ZDI-CAN-14805, update your Cisco Nexus Dashboard Fabric Controller to the latest patched version provided by Cisco.
ZDI-CAN-14805 can lead to complete compromise of the affected system, as it allows remote attackers to execute arbitrary code.
ZDI-CAN-14805 affects installations of the Cisco Nexus Dashboard Fabric Controller.
No, authentication is not required to exploit ZDI-CAN-14805, making it particularly severe.