Tuesday, November 12, 2024
HomeCiscoCisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems

Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems

Published on

Malware protection

A critical vulnerability has been discovered in Cisco’s Nexus Dashboard Fabric Controller (NDFC), potentially allowing hackers to execute arbitrary commands on affected systems.

This flaw, identified as CVE-2024-20432, was first published on October 2, 2024. Its CVSS score of 9.9 indicates its severe impact.

Vulnerability Details

The vulnerability resides in the Cisco NDFC’s REST API and web UI. It could enable an authenticated, low-privileged remote attacker to perform a command injection attack.

- Advertisement - SIEM as a Service

This is due to improper user authorization and insufficient validation of command arguments.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

By exploiting this flaw, attackers can execute arbitrary commands on the command-line interface (CLI) of a Cisco NDFC-managed device with network-admin privileges. 

This vulnerability does not affect Cisco NDFC when configured for storage area network (SAN) controller deployment. However, other implementations remain at risk.

Cisco has confirmed that there are no workarounds for this vulnerability. The company has released software updates to address the issue and urges customers to upgrade their systems promptly.

Affected users can obtain these updates through their usual channels if they have a service contract with Cisco.

Affected and Unaffected Products

The vulnerability affects Cisco NDFC but does not impact Nexus Dashboard Insights or Nexus Dashboard Orchestrator (NDO).

Users are advised to review the advisory for detailed information on vulnerable software releases and to ensure they upgrade to a fixed version as soon as possible.

Cisco advises all users to regularly consult security advisories and ensure their systems are running supported software versions.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...