This vulnerability allows local attackers to escalate privileges on affected installations of Cisco Nexus Dashboard Fabric Controller. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of a user permission. A crafted tcpdump command can trigger execution of a privileged operation. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard Fabric Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-14806 is classified as high due to its potential for local privilege escalation.
To fix ZDI-CAN-14806, upgrade to the latest version of Cisco Nexus Dashboard Fabric Controller as provided in the vendor’s security advisory.
Only installations of Cisco Nexus Dashboard Fabric Controller are affected by ZDI-CAN-14806.
ZDI-CAN-14806 enables local attackers to escalate privileges on the affected system.
An attacker must first obtain the ability to execute low-privileged code on the target system to exploit ZDI-CAN-14806.