mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
68 lines
5.5 KiB
Markdown
68 lines
5.5 KiB
Markdown
### [CVE-2024-20289](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20289)
|
|

|
|

|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
%20&color=brightgreen)
|
|
&color=brightgreen)
|
|
|
|
### Description
|
|
|
|
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to execute arbitrary commands on the underlying operating system of an affected device.
|
|
|
|
This vulnerability is due to insufficient validation of arguments for a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
|
|