Lucene search

K
cve[email protected]CVE-2024-20281
HistoryApr 03, 2024 - 5:15 p.m.

CVE-2024-20281

2024-04-0317:15:47
CWE-352
web.nvd.nist.gov
43
csrf
cisco nexus
remote attack
insufficient protections
administrative privileges

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability in the web-based management interface of Cisco Nexus Dashboard and Cisco Nexus Dashboard hosted services could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.

This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the affected user has administrative privileges, these actions could include modifying the system configuration and creating new privileged accounts.

Note: There are internal security mechanisms in place that limit the scope of this exploit, reducing the Security Impact Rating of this vulnerability.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Data Center Network Manager",
    "versions": [
      {
        "version": "12.1(1)",
        "status": "affected"
      },
      {
        "version": "12.1.1e",
        "status": "affected"
      },
      {
        "version": "12.1.2e",
        "status": "affected"
      },
      {
        "version": "12.1.3b",
        "status": "affected"
      },
      {
        "version": "12.0.1a",
        "status": "affected"
      },
      {
        "version": "12.0.2d",
        "status": "affected"
      },
      {
        "version": "12.0.2f",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Cisco",
    "product": "Cisco Nexus Dashboard",
    "versions": [
      {
        "version": "1.1(0c)",
        "status": "affected"
      },
      {
        "version": "1.1(0d)",
        "status": "affected"
      },
      {
        "version": "1.1(2h)",
        "status": "affected"
      },
      {
        "version": "1.1(2i)",
        "status": "affected"
      },
      {
        "version": "1.1(3c)",
        "status": "affected"
      },
      {
        "version": "1.1(3d)",
        "status": "affected"
      },
      {
        "version": "1.1(3e)",
        "status": "affected"
      },
      {
        "version": "1.1(3f)",
        "status": "affected"
      },
      {
        "version": "2.0(1b)",
        "status": "affected"
      },
      {
        "version": "2.0(1d)",
        "status": "affected"
      },
      {
        "version": "2.0(2g)",
        "status": "affected"
      },
      {
        "version": "2.0(2h)",
        "status": "affected"
      },
      {
        "version": "2.1(1d)",
        "status": "affected"
      },
      {
        "version": "2.1(1e)",
        "status": "affected"
      },
      {
        "version": "2.1(2d)",
        "status": "affected"
      },
      {
        "version": "2.1(2f)",
        "status": "affected"
      },
      {
        "version": "2.2(1e)",
        "status": "affected"
      },
      {
        "version": "2.2(1h)",
        "status": "affected"
      },
      {
        "version": "2.2(2d)",
        "status": "affected"
      },
      {
        "version": "2.3(1c)",
        "status": "affected"
      },
      {
        "version": "2.3(2b)",
        "status": "affected"
      },
      {
        "version": "2.3(2c)",
        "status": "affected"
      },
      {
        "version": "2.3(2d)",
        "status": "affected"
      },
      {
        "version": "2.3(2e)",
        "status": "affected"
      },
      {
        "version": "3.0(1f)",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Cisco",
    "product": "Cisco Nexus Dashboard Orchestrator",
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Cisco",
    "product": "Cisco Nexus Dashboard Insights",
    "versions": [
      {
        "version": "2.2.2.125",
        "status": "affected"
      },
      {
        "version": "2.2.2.126",
        "status": "affected"
      },
      {
        "version": "5.0.1.150",
        "status": "affected"
      },
      {
        "version": "5.0.1.154",
        "status": "affected"
      },
      {
        "version": "5.1.0.131",
        "status": "affected"
      },
      {
        "version": "5.1.0.135",
        "status": "affected"
      },
      {
        "version": "6.0.1",
        "status": "affected"
      },
      {
        "version": "6.0.2",
        "status": "affected"
      },
      {
        "version": "6.1.1",
        "status": "affected"
      },
      {
        "version": "6.1.2",
        "status": "affected"
      },
      {
        "version": "6.1.3",
        "status": "affected"
      },
      {
        "version": "6.3.1",
        "status": "affected"
      },
      {
        "version": "6.2.1",
        "status": "affected"
      },
      {
        "version": "6.2.2",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2024-20281