CVE-2023-48700

The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify the onboarding process of a new device into Nautobot down to, in many cases, an IP Address and a Location. Starting in version 2.0.0 and prior to version 3.0.0, credentials provided to onboarding task are visible via Job Results from an execution of an Onboarding Task. Version 3.0.0 fixes this issue; no known workarounds are available. Mitigation recommendations include deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, upgrading to v3.0.0, and rotating any exposed credentials.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nautobot:nautobot-plugin-device-onboarding:*:*:*:*:*:*:*:*

History

30 Nov 2023, 17:07

Type Values Removed Values Added
References () https://github.com/nautobot/nautobot-plugin-device-onboarding/security/advisories/GHSA-qf3c-rw9f-jh7v - () https://github.com/nautobot/nautobot-plugin-device-onboarding/security/advisories/GHSA-qf3c-rw9f-jh7v - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Nautobot
Nautobot nautobot-plugin-device-onboarding
CPE cpe:2.3:a:nautobot:nautobot-plugin-device-onboarding:*:*:*:*:*:*:*:*

21 Nov 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-21 23:15

Updated : 2023-11-30 17:07


NVD link : CVE-2023-48700

Mitre link : CVE-2023-48700


JSON object : View

Products Affected

nautobot

  • nautobot-plugin-device-onboarding
CWE

No CWE.