CVE-2024-20284
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/08/2024
Last modified:
17/10/2024
Description
A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.<br />
<br />
The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.&nbsp;<br />
Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:nx-os:9.3\(13\):*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c92160yc-x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c92304qc:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c9232c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c92348gc-x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c9236c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c9272q:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c93120tx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c93128tx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c9316d-gx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du
- https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410



