Vulnerability Change Records for CVE-2024-20286
Change History
New CVE Received from Cisco Systems, Inc. 8/28/2024 1:15:08 PM
Action |
Type |
Old Value |
New Value |
Added |
Description |
|
A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.
The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.
Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.
|
Added |
CVSS V3.1 |
|
Cisco Systems, Inc. AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
|
Added |
CWE |
|
Cisco Systems, Inc. CWE-693
|
Added |
Reference |
|
Cisco Systems, Inc. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-psbe-ce-YvbTn5du [No types assigned]
|
Added |
Reference |
|
Cisco Systems, Inc. https://www.cisco.com/c/en/us/td/docs/dcn/nx-os/nexus9000/105x/programmability/cisco-nexus-9000-series-nx-os-programmability-guide-105x/m-n9k-python-api-101x.html?bookSearch=true#concept_A2CFF094ADCB414C983EA06AD8E9A410 [No types assigned]
|
|