Vulnslist

find the latest Cisco vulnerabilities

Cisco Crosswork Network Services Orchestrator Privilege Escalation Vulnerability

cisco-sa-nso-hcc-priv-esc-OWBWCs5D · High · Published · Updated

A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2024-20366
Cisco Bug IDsCSCwi92920
CVSS ScoreBase 7.8
Base 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Network Services Orchestrator

Related Products

Product CVE Evidence
Cisco Crosswork Planning CVE-2024-20366 Cisco OpenVuln
Cisco Network Services Orchestrator CVE-2024-20366 Cisco OpenVuln