{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-20449","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2023-11-08T15:08:07.678Z","datePublished":"2024-10-02T16:54:50.760Z","dateUpdated":"2024-10-02T19:33:43.750Z"},"containers":{"cna":{"title":"Cisco Nexus Dashboard Fabric Controller Remote Code Execution Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"descriptions":[{"lang":"en","value":"A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.\r\n\r\nThis vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary&nbsp;code in a specific container with the privileges of root."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp","name":"cisco-sa-ndfc-ptrce-BUSHLbp"}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-ndfc-ptrce-BUSHLbp","discovery":"INTERNAL","defects":["CSCwk04223"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Relative Path Traversal","type":"cwe","cweId":"CWE-23"}]}],"affected":[{"vendor":"Cisco","product":"Cisco Data Center Network Manager","versions":[{"version":"12.1(1)","status":"affected"},{"version":"12.0.1a","status":"affected"},{"version":"12.0.2d","status":"affected"},{"version":"12.0.2f","status":"affected"},{"version":"12.1.1","status":"affected"},{"version":"12.1.1e","status":"affected"},{"version":"12.1.1p","status":"affected"},{"version":"12.1.2e","status":"affected"},{"version":"12.1.2p","status":"affected"},{"version":"12.1.3b","status":"affected"},{"version":"12.2.1","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2024-10-02T16:54:50.760Z"}},"adp":[{"affected":[{"vendor":"cisco","product":"data_center_network_manager","cpes":["cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"12.1(1)","status":"affected"},{"version":"12.0.1a","status":"affected"},{"version":"12.0.2d","status":"affected"},{"version":"12.0.2f","status":"affected"},{"version":"12.1.1","status":"affected"},{"version":"12.1.1e","status":"affected"},{"version":"12.1.1p","status":"affected"},{"version":"12.1.2e","status":"affected"},{"version":"12.1.2p","status":"affected"},{"version":"12.1.3b","status":"affected"},{"version":"12.2.1","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-02T19:01:03.051565Z","id":"CVE-2024-20449","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-02T19:33:43.750Z"}}]}}