Published on: Not Yet Published
Last Modified on: 07/29/2022 12:38:00 PM UTC
CVE-2022-20913 - advisory for cisco-sa-ndb-afw-2MT9tb99Source: Mitre Source: NIST CVE.ORG Print: PDF
A vulnerability in Cisco Nexus Dashboard could allow an authenticated, remote attacker to write arbitrary files on an affected device. This vulnerability is due to insufficient input validation in the web-based management interface of Cisco Nexus Dashboard. An attacker with Administrator credentials could exploit this vulnerability by uploading a crafted file. A successful exploit could allow the attacker to overwrite arbitrary files on an affected device.
- CVE-2022-20913 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.
- The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
- Affected Vendor/Software: Cisco - Cisco Nexus Dashboard version n/a
CVSS3 Score: 6.5 - MEDIUM
|No Description Provided|| tools.cisco.com |
|CISCO 20220720 Cisco Nexus Dashboard Arbitrary File Write Vulnerability|
Related QID Numbers
- 317212 Cisco Nexus Dashboard Arbitrary File Write Vulnerability (cisco-sa-ndb-afw-2MT9tb99)
Known Affected Configurations (CPE V2.3)
|@CVEreport||CVE-2022-20913 : A vulnerability in Cisco Nexus Dashboard could allow an authenticated, remote attacker to write… twitter.com/i/web/status/1…||2022-07-22 03:36:57|
|@LinInfoSec||Nexus - CVE-2022-20913: tools.cisco.com/security/cente…||2022-07-22 06:13:30|