Vulnerability Description
A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device. This vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Nexus Dashboard Fabric Controller | >= 12.0.0, <= 12.2.2 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-20449?
CVE-2024-20449 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device. This vulnerabili...
How severe is CVE-2024-20449?
CVE-2024-20449 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-20449?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Nexus Dashboard Fabric Controller.