- Home
- Alerts & Advisories
- Alerts
- Unauthorised Access Vulnerabilities in Cisco Nexus Dashboard
Unauthorised Access Vulnerabilities in Cisco Nexus Dashboard
21 July 2022
Cisco has released security updates for three severe vulnerabilities (CVE-2022-20857, CVE-2022-20858, CVE-2022-20861) affecting Cisco Nexus Dashboard 1.1 and later. One of the vulnerabilities, CVE-2022-20857, is rated critical and has a Common Vulnerability Scoring System (CVSS) score of 9.8 out of 10.
These three vulnerabilities could allow an attacker to execute commands and perform actions with root or administrator privileges.
CVE-2022-20857 - A vulnerability in Cisco Nexus Dashboard that could allow an unauthenticated, remote attacker to access a specific application programming interface (API). Through this, the attacker could send crafted HTTP requests to execute arbitrary commands on an affected device as a root user.
CVE-2022-20861 - A vulnerability in the web user interface (UI) of Cisco Nexus Dashboard that could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. This is done by enticing an authenticated administrator to click a malicious link on an affected device to perform actions with administrator privileges.
CVE-2022-20858 - A vulnerability in Cisco Nexus Dashboard that could allow an unauthenticated, remote attacker to download container images or upload malicious container images on an affected device by opening a TCP connection to the container image management service. The malicious images would run after the affected device reboots or a pod (an affected instance connected to the Cisco Nexus Dashboard) restarts.
The following products are affected by these vulnerabilities:
Cisco Nexus Dashboard 1.1 (not affected by CVE-2022-20858)
Cisco Nexus Dashboard 2.0
Cisco Nexus Dashboard 2.1
Cisco Nexus Dashboard 2.2
Administrators of the affected products are advised to upgrade to the latest versions immediately.
More information is available here:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-mhcvuln-vpsBPJ9y