Tuesday, April 1, 2025
HomeCVE/vulnerabilityCisco Nexus Dashboard Flaw Let Remote Attacker Execute Arbitrary Commands

Cisco Nexus Dashboard Flaw Let Remote Attacker Execute Arbitrary Commands

Published on

SIEM as a Service

Follow Us on Google News

The Cisco Nexus Dashboard data center management solution was found to have severe vulnerabilities that Cisco has addressed recently. The total number of vulnerabilities identified was 45, which affected a wide variety of products and services.

A remote attacker can exploit these vulnerabilities to execute commands or perform actions with root privileges or Administrator permissions under the control of a system remotely.

Among the 45 vulnerabilities, the cybersecurity experts have marked them with three tags and here below we have mentioned:-

  • One flaw is rated as “Critical” in severity
  • Three flaws are rated as “High” in severity
  • Rest 41 flaws are rated as “Medium” in severity

Flaws affecting Cisco Nexus Dashboard

In terms of severity, the three most severe vulnerabilities are as follows:- 

Data centers and cloud network infrastructures are affected by these flaws in Cisco Nexus Dashboard. This could enable an unauthenticated remote attacker to perform the following illicit activities:-

  • Execute arbitrary commands
  • Read or upload container image files
  • Perform a cross-site request forgery attack

Flaw Profile

  • CVE ID: CVE-2022-20857
  • Summary: Cisco Nexus Dashboard Arbitrary Command Execution Vulnerability
  • Cisco Bug ID: CSCwa93560
  • Advisory ID: cisco-sa-ndb-mhcvuln-vpsBPJ9y
  • Security Impact Rating (SIR): Critical
  • CVSS Base Score: 9.8
  • Workarounds: Workarounds are not available.
  • CVE ID: CVE-2022-20861
  • Summary: Cisco Nexus Dashboard Cross-Site Request Forgery Vulnerability
  • Cisco Bug ID: CSCwa75451
  • Advisory ID: cisco-sa-ndb-mhcvuln-vpsBPJ9y
  • Security Impact Rating (SIR): High
  • CVSS Base Score: 8.8
  • Workarounds: Workarounds are not available.
  • CVE ID: CVE-2022-20858
  • Summary: Cisco Nexus Dashboard Container Image Read and Write Vulnerability
  • Cisco Bug ID: CSCwb24518
  • Advisory ID: cisco-sa-ndb-mhcvuln-vpsBPJ9y
  • Security Impact Rating (SIR): High
  • CVSS Base Score: 8.2
  • Workarounds: Workarounds are not available.

The Cisco Nexus Dashboard 1.1 version and subsequent versions are affected by the three vulnerabilities that were discovered during the ongoing internal security testing of Cisco Nexus Dashboards. Dashboard version 2.2(1e) has been released with fixes and improvements for the issues that have been reported.

No exploitation has been reported

It would be possible for the malicious images to be executed whenever a device or pod was rebooted or restarted. During internal security testing conducted by Cisco’s ASIG, security researchers found these vulnerabilities and reported them.

In response to a question from the PSIRT of Cisco, the company has confirmed that it is not aware of any exploits in the wild that are publicly available. 

It is possible that the attacker may also be able to view sensitive information if the exploit is successful, such as the administrator credentials for the affected controllers.

As a side note, Cisco also released patches for 10 security flaws a little over two weeks after releasing the initial updates.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Massive 400GB X (Twitter) Data Leaked – 2.8 Billion Records Exposed

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...

PortSwigger Launches Burp AI to Enhance Penetration Testing with AI

PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the...

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised...

Kentico Xperience CMS XSS Vulnerability Allows Remote Code Execution

Kentico Xperience CMS, a widely used platform designed for enterprises and organizations, is under...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Massive 400GB X (Twitter) Data Leaked – 2.8 Billion Records Exposed

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...

PortSwigger Launches Burp AI to Enhance Penetration Testing with AI

PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the...

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised...