First published: Wed Jul 20 2022(Updated: )
A vulnerability in Cisco Nexus Dashboard could allow an authenticated, remote attacker to write arbitrary files on an affected device. This vulnerability is due to insufficient input validation in the web-based management interface of Cisco Nexus Dashboard. An attacker with Administrator credentials could exploit this vulnerability by uploading a crafted file. A successful exploit could allow the attacker to overwrite arbitrary files on an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-afw-2MT9tb99
Credit: by Chris Dean the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard | >=2.0=2.1<=2.2<2.2(1e) | 2.2(1e) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Cisco Nexus Dashboard Arbitrary File Write Vulnerability is cisco-sa-ndb-afw-2MT9tb99.
The severity level of the Cisco Nexus Dashboard Arbitrary File Write Vulnerability is medium (4.9).
The Cisco Nexus Dashboard Arbitrary File Write Vulnerability occurs due to insufficient input validation in the web-based management interface of Cisco Nexus Dashboard.
An authenticated, remote attacker with administrator credentials can exploit the Cisco Nexus Dashboard Arbitrary File Write Vulnerability.
The affected software for the Cisco Nexus Dashboard Arbitrary File Write Vulnerability is Cisco Nexus Dashboard version 2.0 up to 2.2(1e).