All the vulnerabilites related to Cisco - Cisco Nexus Dashboard Orchestrator
cve-2024-20385
Vulnerability from cvelistv5
Published
2024-10-02 16:52
Modified
2024-10-02 19:02
Severity ?
EPSS score ?
Summary
Cisco Nexus Dashboard Orchestrator SSL Certificate Validation Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco Nexus Dashboard Orchestrator |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20385", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:02:38.591795Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T19:02:55.769Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Nexus Dashboard Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.7(1d)" }, { "status": "affected", "version": "3.7(1g)" }, { "status": "affected", "version": "3.7(1h)" }, { "status": "affected", "version": "3.7(1j)" }, { "status": "affected", "version": "3.7(1i)" }, { "status": "affected", "version": "3.7(1k)" }, { "status": "affected", "version": "3.7(1l)" }, { "status": "affected", "version": "3.7(2d)" }, { "status": "affected", "version": "3.7(2e)" }, { "status": "affected", "version": "3.7(2f)" }, { "status": "affected", "version": "3.7(2g)" }, { "status": "affected", "version": "3.7(2h)" }, { "status": "affected", "version": "4.1(2e)" }, { "status": "affected", "version": "3.7(2i)" }, { "status": "affected", "version": "4.1(2h)" }, { "status": "affected", "version": "4.2(1d)" }, { "status": "affected", "version": "4.2(1e)" }, { "status": "affected", "version": "4.2(2e)" }, { "status": "affected", "version": "4.2(3e)" }, { "status": "affected", "version": "4.3.(1.1008)" }, { "status": "affected", "version": "4.2(3j)" }, { "status": "affected", "version": "4.2(3k)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the SSL/TLS implementation of Cisco Nexus Dashboard Orchestrator (NDO) could allow an unauthenticated, remote attacker to intercept sensitive information from an affected device.\u0026nbsp;\r\n\r\nThis vulnerability exists because the Cisco NDO Validate Peer Certificate site management feature validates the certificates for Cisco Application Policy Infrastructure Controller (APIC), Cisco Cloud Network Controller (CNC), and Cisco Nexus Dashboard only when a new site is added or an existing one is reregistered. An attacker could exploit this vulnerability by using machine-in-the-middle techniques to intercept the traffic between the affected device and Cisco NDO and then using a crafted certificate to impersonate the affected device. A successful exploit could allow the attacker to learn sensitive information during communications between these devices." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "Improper Certificate Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:52:55.860Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndo-tlsvld-FdUF3cpw", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-tlsvld-FdUF3cpw" } ], "source": { "advisory": "cisco-sa-ndo-tlsvld-FdUF3cpw", "defects": [ "CSCwi72006" ], "discovery": "EXTERNAL" }, "title": "Cisco Nexus Dashboard Orchestrator SSL Certificate Validation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20385", "datePublished": "2024-10-02T16:52:55.860Z", "dateReserved": "2023-11-08T15:08:07.658Z", "dateUpdated": "2024-10-02T19:02:55.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20302
Vulnerability from cvelistv5
Published
2024-04-03 16:21
Modified
2024-08-01 21:59
Severity ?
EPSS score ?
Summary
A vulnerability in the tenant security implementation of Cisco Nexus Dashboard Orchestrator (NDO) could allow an authenticated, remote attacker to modify or delete tenant templates on an affected system.
This vulnerability is due to improper access controls within tenant security. An attacker who is using a valid user account with write privileges and either a Site Manager or Tenant Manager role could exploit this vulnerability. A successful exploit could allow the attacker to modify or delete tenant templates under non-associated tenants, which could disrupt network traffic.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco Nexus Dashboard Orchestrator |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20302", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-03T17:49:52.049033Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:39:57.558Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.220Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ndo-upav-YRqsCcSP", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-upav-YRqsCcSP" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Nexus Dashboard Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the tenant security implementation of Cisco Nexus Dashboard Orchestrator (NDO) could allow an authenticated, remote attacker to modify or delete tenant templates on an affected system. \r\n \r\nThis vulnerability is due to improper access controls within tenant security. An attacker who is using a valid user account with write privileges and either a Site Manager or Tenant Manager role could exploit this vulnerability. A successful exploit could allow the attacker to modify or delete tenant templates under non-associated tenants, which could disrupt network traffic." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-03T16:21:29.900Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndo-upav-YRqsCcSP", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-upav-YRqsCcSP" } ], "source": { "advisory": "cisco-sa-ndo-upav-YRqsCcSP", "defects": [ "CSCwi31692" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20302", "datePublished": "2024-04-03T16:21:29.900Z", "dateReserved": "2023-11-08T15:08:07.630Z", "dateUpdated": "2024-08-01T21:59:42.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20490
Vulnerability from cvelistv5
Published
2024-10-02 16:55
Modified
2024-10-02 17:26
Severity ?
EPSS score ?
Summary
Cisco Nexus Dashboard Fabric Controller and Nexus Dashboard Orchestrator Information Disclosure Vulnerability
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20490", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T17:17:55.986708Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T17:26:15.286Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.1p" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.2p" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.2.1" }, { "status": "affected", "version": "12.2.2" } ] }, { "defaultStatus": "unknown", "product": "Cisco Nexus Dashboard Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.0(1i)" }, { "status": "affected", "version": "1.0(2b)" }, { "status": "affected", "version": "3.7(1d)" }, { "status": "affected", "version": "3.7(1g)" }, { "status": "affected", "version": "3.7(1h)" }, { "status": "affected", "version": "3.7(1j)" }, { "status": "affected", "version": "3.7(1i)" }, { "status": "affected", "version": "3.7(1k)" }, { "status": "affected", "version": "3.7(1l)" }, { "status": "affected", "version": "3.7(2d)" }, { "status": "affected", "version": "3.7(2e)" }, { "status": "affected", "version": "3.7(2f)" }, { "status": "affected", "version": "3.7(2g)" }, { "status": "affected", "version": "3.7(2h)" }, { "status": "affected", "version": "4.1(2e)" }, { "status": "affected", "version": "3.7(2i)" }, { "status": "affected", "version": "4.1(2h)" }, { "status": "affected", "version": "4.2(1d)" }, { "status": "affected", "version": "4.2(1e)" }, { "status": "affected", "version": "4.2(2e)" }, { "status": "affected", "version": "4.2(3e)" }, { "status": "affected", "version": "4.3.(1.1008)" }, { "status": "affected", "version": "4.2(3j)" }, { "status": "affected", "version": "4.2(3k)" }, { "status": "affected", "version": "4.4(1.1009)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in a logging function of Cisco Nexus Dashboard Fabric Controller (NDFC) and Cisco Nexus Dashboard Orchestrator (NDO) could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because HTTP proxy credentials could be recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view HTTP proxy server admin credentials in clear text that are configured on Nexus Dashboard to reach an external network.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T16:55:15.650Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndhs-idv-Bk8VqEDc", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc" } ], "source": { "advisory": "cisco-sa-ndhs-idv-Bk8VqEDc", "defects": [ "CSCwk96526" ], "discovery": "INTERNAL" }, "title": "Cisco Nexus Dashboard Fabric Controller and Nexus Dashboard Orchestrator Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20490", "datePublished": "2024-10-02T16:55:15.650Z", "dateReserved": "2023-11-08T15:08:07.685Z", "dateUpdated": "2024-10-02T17:26:15.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20281
Vulnerability from cvelistv5
Published
2024-04-03 16:20
Modified
2024-08-01 21:59
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco Nexus Dashboard and Cisco Nexus Dashboard hosted services could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.
This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the affected user has administrative privileges, these actions could include modifying the system configuration and creating new privileged accounts.
Note: There are internal security mechanisms in place that limit the scope of this exploit, reducing the Security Impact Rating of this vulnerability.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20281", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-05T19:36:14.483327Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:22.646Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:41.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ndfccsrf-TEmZEfJ9", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfccsrf-TEmZEfJ9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Data Center Network Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1(1)" }, { "status": "affected", "version": "12.1.1e" }, { "status": "affected", "version": "12.1.2e" }, { "status": "affected", "version": "12.1.3b" }, { "status": "affected", "version": "12.0.1a" }, { "status": "affected", "version": "12.0.2d" }, { "status": "affected", "version": "12.0.2f" } ] }, { "product": "Cisco Nexus Dashboard", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "1.1(0c)" }, { "status": "affected", "version": "1.1(0d)" }, { "status": "affected", "version": "1.1(2h)" }, { "status": "affected", "version": "1.1(2i)" }, { "status": "affected", "version": "1.1(3c)" }, { "status": "affected", "version": "1.1(3d)" }, { "status": "affected", "version": "1.1(3e)" }, { "status": "affected", "version": "1.1(3f)" }, { "status": "affected", "version": "2.0(1b)" }, { "status": "affected", "version": "2.0(1d)" }, { "status": "affected", "version": "2.0(2g)" }, { "status": "affected", "version": "2.0(2h)" }, { "status": "affected", "version": "2.1(1d)" }, { "status": "affected", "version": "2.1(1e)" }, { "status": "affected", "version": "2.1(2d)" }, { "status": "affected", "version": "2.1(2f)" }, { "status": "affected", "version": "2.2(1e)" }, { "status": "affected", "version": "2.2(1h)" }, { "status": "affected", "version": "2.2(2d)" }, { "status": "affected", "version": "2.3(1c)" }, { "status": "affected", "version": "2.3(2b)" }, { "status": "affected", "version": "2.3(2c)" }, { "status": "affected", "version": "2.3(2d)" }, { "status": "affected", "version": "2.3(2e)" }, { "status": "affected", "version": "3.0(1f)" } ] }, { "product": "Cisco Nexus Dashboard Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Nexus Dashboard Insights", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.2.2.125" }, { "status": "affected", "version": "2.2.2.126" }, { "status": "affected", "version": "5.0.1.150" }, { "status": "affected", "version": "5.0.1.154" }, { "status": "affected", "version": "5.1.0.131" }, { "status": "affected", "version": "5.1.0.135" }, { "status": "affected", "version": "6.0.1" }, { "status": "affected", "version": "6.0.2" }, { "status": "affected", "version": "6.1.1" }, { "status": "affected", "version": "6.1.2" }, { "status": "affected", "version": "6.1.3" }, { "status": "affected", "version": "6.3.1" }, { "status": "affected", "version": "6.2.1" }, { "status": "affected", "version": "6.2.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Nexus Dashboard and Cisco Nexus Dashboard hosted services could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. If the affected user has administrative privileges, these actions could include modifying the system configuration and creating new privileged accounts.\r\n\r Note: There are internal security mechanisms in place that limit the scope of this exploit, reducing the Security Impact Rating of this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-03T16:20:04.470Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ndfccsrf-TEmZEfJ9", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfccsrf-TEmZEfJ9" } ], "source": { "advisory": "cisco-sa-ndfccsrf-TEmZEfJ9", "defects": [ "CSCwf16632", "CSCwh13498", "CSCwh00221", "CSCwh00212" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20281", "datePublished": "2024-04-03T16:20:04.470Z", "dateReserved": "2023-11-08T15:08:07.626Z", "dateUpdated": "2024-08-01T21:59:41.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }