A vulnerability in the backup restore functionality of Cisco Nexus Dashboard could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device.
This vulnerability is due to insufficient validation of the contents of a backup file. An attacker with valid Administrator credentials could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to gain root privileges on the underlying shell on the affected device.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ptrs-XU2Fm2Wb | Vendor Advisory |
Configurations
History
08 Sep 2025, 16:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:* | |
First Time |
Cisco nexus Dashboard
Cisco |
|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ptrs-XU2Fm2Wb - Vendor Advisory |
29 Aug 2025, 16:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-27 17:15
Updated : 2025-09-08 16:20
NVD link : CVE-2025-20344
Mitre link : CVE-2025-20344
CVE.ORG link : CVE-2025-20344
JSON object : View
Products Affected
cisco
- nexus_dashboard
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')