CVE-2024-20302

A vulnerability in the tenant security implementation of Cisco Nexus Dashboard Orchestrator (NDO) could allow an authenticated, remote attacker to modify or delete tenant templates on an affected system. This vulnerability is due to improper access controls within tenant security. An attacker who is using a valid user account with write privileges and either a Site Manager or Tenant Manager role could exploit this vulnerability. A successful exploit could allow the attacker to modify or delete tenant templates under non-associated tenants, which could disrupt network traffic.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*

History

11 Apr 2025, 15:17

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Cisco nexus Dashboard Orchestrator
Cisco
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-upav-YRqsCcSP - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-upav-YRqsCcSP - Vendor Advisory
CPE cpe:2.3:a:cisco:nexus_dashboard_orchestrator:*:*:*:*:*:*:*:*

Information

Published : 2024-04-03 17:15

Updated : 2025-04-11 15:17


NVD link : CVE-2024-20302

Mitre link : CVE-2024-20302

CVE.ORG link : CVE-2024-20302


JSON object : View

Products Affected

cisco

  • nexus_dashboard_orchestrator
CWE
CWE-284

Improper Access Control

NVD-CWE-noinfo