Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-20860

Опубликовано: 21 июл. 2022
Источник: nvd
CVSS3: 7.4
EPSS Низкий

Описание

A vulnerability in the SSL/TLS implementation of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to alter communications with associated controllers or view sensitive information. This vulnerability exists because SSL server certificates are not validated when Cisco Nexus Dashboard is establishing a connection to Cisco Application Policy Infrastructure Controller (APIC), Cisco Cloud APIC, or Cisco Nexus Dashboard Fabric Controller, formerly Data Center Network Manager (DCNM) controllers. An attacker could exploit this vulnerability by using man-in-the-middle techniques to intercept the traffic between the affected device and the controllers, and then using a crafted certificate to impersonate the controllers. A successful exploit could allow the attacker to alter communications between devices or view sensitive information, including Administrator credentials for these controllers.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*
Версия от 1.1 (включая) до 2.2\(1h\) (исключая)

EPSS

Процентиль: 48%
0.00251
Низкий

7.4 High

CVSS3

Дефекты

CWE-295
CWE-295

Связанные уязвимости

CVSS3: 7.4
github
больше 3 лет назад

A vulnerability in the SSL/TLS implementation of Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to alter communications with associated controllers or view sensitive information. This vulnerability exists because SSL server certificates are not validated when Cisco Nexus Dashboard is establishing a connection to Cisco Application Policy Infrastructure Controller (APIC), Cisco Cloud APIC, or Cisco Nexus Dashboard Fabric Controller, formerly Data Center Network Manager (DCNM) controllers. An attacker could exploit this vulnerability by using man-in-the-middle techniques to intercept the traffic between the affected device and the controllers, and then using a crafted certificate to impersonate the controllers. A successful exploit could allow the attacker to alter communications between devices or view sensitive information, including Administrator credentials for these controllers.

CVSS3: 7.4
fstec
больше 3 лет назад

Уязвимость реализации протоколов TLS и SSL платформы аналитики и автоматизации работы с многооблачными сетями дата-центров Cisco Nexus Dashboard, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю получить доступ к конфиденциальной информации или изменить данные

EPSS

Процентиль: 48%
0.00251
Низкий

7.4 High

CVSS3

Дефекты

CWE-295
CWE-295