mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
60 lines
2.6 KiB
JSON
60 lines
2.6 KiB
JSON
{
|
|
"id": "CVE-2024-20397",
|
|
"sourceIdentifier": "psirt@cisco.com",
|
|
"published": "2024-12-04T17:15:11.913",
|
|
"lastModified": "2025-02-05T21:15:22.590",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification. \r\n\r\nThis vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en el cargador de arranque del software Cisco NX-OS podr\u00eda permitir que un atacante no autenticado con acceso f\u00edsico a un dispositivo afectado, o un atacante local autenticado con credenciales administrativas, eluda la verificaci\u00f3n de la firma de la imagen de NX-OS. Esta vulnerabilidad se debe a una configuraci\u00f3n insegura del cargador de arranque. Un atacante podr\u00eda aprovechar esta vulnerabilidad ejecutando una serie de comandos del cargador de arranque. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante eludir la verificaci\u00f3n de la firma de la imagen de NX-OS y cargar software no verificado."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "psirt@cisco.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
|
|
"baseScore": 5.2,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "PHYSICAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 0.9,
|
|
"impactScore": 4.2
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "psirt@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-284"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-image-sig-bypas-pQDRQvjL",
|
|
"source": "psirt@cisco.com"
|
|
}
|
|
]
|
|
} |