First published: Wed Jul 20 2022(Updated: )
Multiple vulnerabilities in Cisco Nexus Dashboard could allow an authenticated, local attacker to elevate privileges on an affected device. These vulnerabilities are due to insufficient input validation during CLI command execution on an affected device. An attacker could exploit these vulnerabilities by authenticating as the rescue-user and executing vulnerable CLI commands using a malicious payload. A successful exploit could allow the attacker to elevate privileges to root on an affected device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mprvesc-EMhDgXe5
Credit: X.B. the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard | >=1.1=2.0=2.1<=2.2<2.2(1e) | 2.2(1e) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
Cisco Nexus Dashboard Privilege Escalation Vulnerabilities are multiple vulnerabilities in Cisco Nexus Dashboard that could allow an authenticated, local attacker to elevate privileges on an affected device.
These vulnerabilities are due to insufficient input validation during CLI command execution on an affected device.
An attacker could exploit these vulnerabilities by leveraging insufficient input validation during CLI command execution on an affected device.
The severity of Cisco Nexus Dashboard Privilege Escalation Vulnerabilities is medium with a severity value of 6.
Versions 1.1, 2.0, 2.1, and up to 2.2(1e) of Cisco Nexus Dashboard are affected by these vulnerabilities.