A vulnerability in the backup restore functionality of Cisco Nexus Dashboard could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device.
This vulnerability is due to insufficient validation of the contents of a backup file. An attacker with valid Administrator credentials could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to gain root privileges on the underlying shell on the affected device.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ptrs-XU2Fm2Wb | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-08-27 17:15
Updated : 2025-09-08 16:20
NVD link : CVE-2025-20344
Mitre link : CVE-2025-20344
CVE.ORG link : CVE-2025-20344
JSON object : View
Products Affected
cisco
- nexus_dashboard
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
