Today > vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-20448

Oct. 8, 2024, 3:25 p.m.

CVSS Score

8.6 / 10

Products Impacted

Vendor Product Versions
cisco
  • nexus_dashboard_fabric_controller
  • *

Description

A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information. This vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key.

Weaknesses

CWE-312
Cleartext Storage of Sensitive Information

The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.

CWE ID: 312
CWE-313
Cleartext Storage in a File or on Disk

The product stores sensitive information in cleartext in a file, or on disk.

CWE ID: 313

Date

Published: Oct. 2, 2024, 5:15 p.m.

Last Modified: Oct. 8, 2024, 3:25 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

ykramarz@cisco.com

CPEs

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a cisco nexus_dashboard_fabric_controller / / / / / / / /

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

Base Score
8.6
Exploitability Score
3.9
Impact Score
4.0
Base Severity
HIGH
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

References