Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-20444", "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "state": "PUBLISHED", "assignerShortName": "cisco", "dateReserved": "2023-11-08T15:08:07.677Z", "datePublished": "2024-10-02T16:54:09.855Z", "dateUpdated": "2024-10-02T19:45:29.694Z"}, "containers": {"cna": {"title": "Cisco Nexus Dashboard Fabric Controller REST API Command Injection Vulnerability", "metrics": [{"format": "cvssV3_1", "cvssV3_1": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "LOW"}}], "descriptions": [{"lang": "en", "value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device.\r\n \r\nThis vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition."}], "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-raci-T46k3jnN", "name": "cisco-sa-ndfc-raci-T46k3jnN"}], "exploits": [{"lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "source": {"advisory": "cisco-sa-ndfc-raci-T46k3jnN", "discovery": "INTERNAL", "defects": ["CSCwj55173"]}, "problemTypes": [{"descriptions": [{"lang": "en", "description": "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')", "type": "cwe", "cweId": "CWE-88"}]}], "affected": [{"vendor": "Cisco", "product": "Cisco Data Center Network Manager", "versions": [{"version": "11.2(1)", "status": "affected"}, {"version": "7.0(2)", "status": "affected"}, {"version": "10.3(2)IPFM", "status": "affected"}, {"version": "10.1(1)", "status": "affected"}, {"version": "7.2(3)", "status": "affected"}, {"version": "7.2(2)", "status": "affected"}, {"version": "7.2(1)", "status": "affected"}, {"version": "11.0(1)", "status": "affected"}, {"version": "10.4(1)", "status": "affected"}, {"version": "10.2(1)", "status": "affected"}, {"version": "7.2(2a)", "status": "affected"}, {"version": "10.1(2)", "status": "affected"}, {"version": "7.1(1)", "status": "affected"}, {"version": "12.1(1)", "status": "affected"}, {"version": "11.1(1)", "status": "affected"}, {"version": "10.3(1)", "status": "affected"}, {"version": "10.3(1)R(1)", "status": "affected"}, {"version": "7.0(1)", "status": "affected"}, {"version": "10.0(1)", "status": "affected"}, {"version": "7.1(2)", "status": "affected"}, {"version": "11.4(1)", "status": "affected"}, {"version": "10.4(2)", "status": "affected"}, {"version": "11.3(1)", "status": "affected"}, {"version": "11.5(1)", "status": "affected"}, {"version": "11.5(2)", "status": "affected"}, {"version": "11.5(3)", "status": "affected"}, {"version": "12.0.1a", "status": "affected"}, {"version": "11.5(3a)", "status": "affected"}, {"version": "12.0.2d", "status": "affected"}, {"version": "12.0.2f", "status": "affected"}, {"version": "11.5(4)", "status": "affected"}, {"version": "12.1.1", "status": "affected"}, {"version": "12.1.1e", "status": "affected"}, {"version": "12.1.1p", "status": "affected"}, {"version": "12.1.2e", "status": "affected"}, {"version": "12.1.2p", "status": "affected"}, {"version": "12.1.3b", "status": "affected"}, {"version": "12.2.1", "status": "affected"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco", "dateUpdated": "2024-10-02T16:54:09.855Z"}}, "adp": [{"affected": [{"vendor": "cisco", "product": "data_center_network_manager", "cpes": ["cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "11.2(1)", "status": "affected"}, {"version": "7.0(2)", "status": "affected"}, {"version": "10.3(2)IPFM", "status": "affected"}, {"version": "10.1(1)", "status": "affected"}, {"version": "7.2(3)", "status": "affected"}, {"version": "7.2(2)", "status": "affected"}, {"version": "7.2(1)", "status": "affected"}, {"version": "11.0(1)", "status": "affected"}, {"version": "10.4(1)", "status": "affected"}, {"version": "10.2(1)", "status": "affected"}, {"version": "7.2(2a)", "status": "affected"}, {"version": "10.1(2)", "status": "affected"}, {"version": "7.1(1)", "status": "affected"}, {"version": "12.1(1)", "status": "affected"}, {"version": "11.1(1)", "status": "affected"}, {"version": "10.3(1)", "status": "affected"}, {"version": "10.3(1)R(1)", "status": "affected"}, {"version": "7.0(1)", "status": "affected"}, {"version": "10.0(1)", "status": "affected"}, {"version": "7.1(2)", "status": "affected"}, {"version": "11.4(1)", "status": "affected"}, {"version": "10.4(2)", "status": "affected"}, {"version": "11.3(1)", "status": "affected"}, {"version": "11.5(1)", "status": "affected"}, {"version": "11.5(2)", "status": "affected"}, {"version": "11.5(3)", "status": "affected"}, {"version": "12.0.1a", "status": "affected"}, {"version": "11.5(3a)", "status": "affected"}, {"version": "12.0.2d", "status": "affected"}, {"version": "12.0.2f", "status": "affected"}, {"version": "11.5(4)", "status": "affected"}, {"version": "12.1.1", "status": "affected"}, {"version": "12.1.1e", "status": "affected"}, {"version": "12.1.1p", "status": "affected"}, {"version": "12.1.2e", "status": "affected"}, {"version": "12.1.2p", "status": "affected"}, {"version": "12.1.3b", "status": "affected"}, {"version": "12.2.1", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-02T19:29:46.344080Z", "id": "CVE-2024-20444", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-02T19:45:29.694Z"}}]}}