CVE-2024-20286

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/08/2024
Last modified:
22/10/2024

Description

A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.<br /> <br /> The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.&amp;nbsp;<br /> Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:cisco:nx-os:9.3\(13\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c92160yc-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c92304qc:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c9232c:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c92348gc-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c9236c:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c9272q:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c93120tx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c93128tx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c9316d-gx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*