CVE-2024-20366

A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*

History

25 Mar 2025, 17:49

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*
First Time Cisco
Cisco network Services Orchestrator
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D - Vendor Advisory
CWE CWE-427

Information

Published : 2024-05-15 18:15

Updated : 2025-03-25 17:49


NVD link : CVE-2024-20366

Mitre link : CVE-2024-20366

CVE.ORG link : CVE-2024-20366


JSON object : View

Products Affected

cisco

  • network_services_orchestrator
CWE
CWE-73

External Control of File Name or Path

CWE-427

Uncontrolled Search Path Element