CVE-2024-20282

A vulnerability in Cisco Nexus Dashboard could allow an authenticated, local attacker with valid rescue-user credentials to elevate privileges to root on an affected device. This vulnerability is due to insufficient protections for a sensitive access token. An attacker could exploit this vulnerability by using this token to access resources within the device infrastructure. A successful exploit could allow an attacker to gain root access to the filesystem or hosted containers on an affected device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*

History

07 May 2025, 14:48

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.0
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH - Vendor Advisory
CPE cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*
CWE CWE-522
First Time Cisco nexus Dashboard
Cisco

03 Apr 2024, 17:24

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 17:15

Updated : 2025-05-07 14:48


NVD link : CVE-2024-20282

Mitre link : CVE-2024-20282


JSON object : View

Products Affected

cisco

  • nexus_dashboard
CWE
CWE-522

Insufficiently Protected Credentials