Lucene search

K
ciscoCiscoCISCO-SA-NDO-UPAV-YRQSCCSP
HistoryApr 03, 2024 - 4:00 p.m.

Cisco Nexus Dashboard Orchestrator Unauthorized Policy Actions Vulnerability

2024-04-0316:00:00
tools.cisco.com
11
vulnerability
cisco
nexus dashboard orchestrator
unauthorized
access controls
software updates
tenant security

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability in the tenant security implementation of Cisco Nexus Dashboard Orchestrator (NDO) could allow an authenticated, remote attacker to modify or delete tenant templates on an affected system.

This vulnerability is due to improper access controls within tenant security. An attacker who is using a valid user account with write privileges and either a Site Manager or Tenant Manager role could exploit this vulnerability. A successful exploit could allow the attacker to modify or delete tenant templates under non-associated tenants, which could disrupt network traffic.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-upav-YRqsCcSP [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-upav-YRqsCcSP”]

Affected configurations

Vulners
Node
cisconexus_dashboardMatchany
OR
cisconexus_dashboardMatchany

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CISCO-SA-NDO-UPAV-YRQSCCSP