A vulnerability in Cisco Nexus Dashboard could allow an authenticated, local attacker with valid rescue-user credentials to elevate privileges to root on an affected device.
 This vulnerability is due to insufficient protections for a sensitive access token. An attacker could exploit this vulnerability by using this token to access resources within the device infrastructure. A successful exploit could allow an attacker to gain root access to the filesystem or hosted containers on an affected device.
                
            References
                    Configurations
                    History
                    07 May 2025, 14:48
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:* | |
| First Time | Cisco nexus Dashboard Cisco | |
| References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH - Vendor Advisory | |
| CWE | CWE-522 | 
21 Nov 2024, 08:52
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndru-pesc-kZ2PQLZH - | 
03 Apr 2024, 17:24
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-04-03 17:15
Updated : 2025-05-07 14:48
NVD link : CVE-2024-20282
Mitre link : CVE-2024-20282
CVE.ORG link : CVE-2024-20282
JSON object : View
Products Affected
                cisco
- nexus_dashboard
