Логотип exploitDog
bind:CVE-2020-3454
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3454

Количество 3

Количество 3

nvd логотип

CVE-2020-3454

больше 5 лет назад

A vulnerability in the Call Home feature of Cisco NX-OS Software could allow an authenticated, remote attacker to inject arbitrary commands that could be executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of specific Call Home configuration parameters when the software is configured for transport method HTTP. An attacker could exploit this vulnerability by modifying parameters within the Call Home configuration on an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying OS.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-m2wj-fv5g-v2xg

больше 3 лет назад

A vulnerability in the Call Home feature of Cisco NX-OS Software could allow an authenticated, remote attacker to inject arbitrary commands that could be executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of specific Call Home configuration parameters when the software is configured for transport method HTTP. An attacker could exploit this vulnerability by modifying parameters within the Call Home configuration on an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying OS.

EPSS: Низкий
fstec логотип

BDU:2020-04135

больше 5 лет назад

Уязвимость функции Call Home сетевой операционной системы Cisco NX-OS, позволяющая нарушителю выполнить произвольные команды с привилегиями root

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3454

A vulnerability in the Call Home feature of Cisco NX-OS Software could allow an authenticated, remote attacker to inject arbitrary commands that could be executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of specific Call Home configuration parameters when the software is configured for transport method HTTP. An attacker could exploit this vulnerability by modifying parameters within the Call Home configuration on an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying OS.

CVSS3: 7.2
2%
Низкий
больше 5 лет назад
github логотип
GHSA-m2wj-fv5g-v2xg

A vulnerability in the Call Home feature of Cisco NX-OS Software could allow an authenticated, remote attacker to inject arbitrary commands that could be executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of specific Call Home configuration parameters when the software is configured for transport method HTTP. An attacker could exploit this vulnerability by modifying parameters within the Call Home configuration on an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying OS.

2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-04135

Уязвимость функции Call Home сетевой операционной системы Cisco NX-OS, позволяющая нарушителю выполнить произвольные команды с привилегиями root

CVSS3: 7.2
2%
Низкий
больше 5 лет назад

Уязвимостей на страницу