CVE-2024-20285
CVSS V2 None
CVSS V3 None
Description
A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.
The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.
Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.
Overview
- CVE ID
- CVE-2024-20285
- Assigner
- cisco
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-08-28T16:37:27.149Z
- Last Modified Date
- 2024-08-28T17:19:57.207Z
Weakness Enumerations
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-20285 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20285 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-08-29 13:06:39 | Added to TrackCVE |