CRITICALCVE-2022-20858CVSS 9.8

Cisco Nexus Dashboard Unbefugter Zugriff Schwachstellen

Plattform

cisco

Komponente

cisco-nexus-dashboard

AI Confidence: highNVDEPSS 1.4%Geprüft: Mai 2026
Wird in Ihre Sprache übersetzt…

CVE-2022-20858 represents a critical set of vulnerabilities within Cisco Nexus Dashboard. These flaws allow an unauthenticated, remote attacker to potentially execute arbitrary commands, access sensitive container image files, or launch cross-site request forgery (CSRF) attacks. The vulnerability impacts versions of Cisco Nexus Dashboard prior to a fixed release, requiring immediate attention to mitigate the risk.

Auswirkungen und Angriffsszenarienwird übersetzt…

The potential impact of CVE-2022-20858 is severe. Successful exploitation of the command execution vulnerability could grant an attacker complete control over the affected Cisco Nexus Dashboard instance. This could lead to data breaches, system compromise, and disruption of network services. The ability to read or upload container images poses a significant risk, potentially exposing sensitive application code and configurations. Furthermore, CSRF attacks could be leveraged to perform unauthorized actions on behalf of legitimate users, further expanding the attack surface. The lack of authentication required for exploitation significantly increases the likelihood of successful attacks.

Ausnutzungskontextwird übersetzt…

This vulnerability is considered high-risk due to its critical CVSS score and the lack of authentication required for exploitation. Public proof-of-concept exploits are likely to emerge, increasing the risk of widespread attacks. Monitor CISA and Cisco security advisories for updates and potential exploitation campaigns. The vulnerability was publicly disclosed on July 21, 2022.

Wer Ist Gefährdetwird übersetzt…

Organizations heavily reliant on Cisco Nexus Dashboard for network management and automation are particularly at risk. Environments with limited network segmentation or weak access controls are also highly vulnerable. Shared hosting environments where multiple tenants share the same Cisco Nexus Dashboard instance face increased risk of lateral movement if one tenant is compromised.

Erkennungsschrittewird übersetzt…

• cisco / network-device:

Get-CimInstance -ClassName Win32_NetworkAdapterConfiguration | Where-Object {$_.IPEnabled -eq $true} | Select-Object Description, IPAddress, SubnetMask

• cisco / network-device:

show version | grep 'Cisco Nexus Dashboard'

• generic web:

curl -I https://<nexus_dashboard_ip>/api/v1/system/status

• generic web:

 grep -i "Cisco Nexus Dashboard" /var/log/nginx/access.log

Angriffszeitlinie

  1. Disclosure

    disclosure

Bedrohungsanalyse

Exploit-Status

Proof of ConceptUnbekannt
CISA KEVNO
Internet-ExponierungHoch

EPSS

1.43% (81% Perzentil)

CVSS-Vektor

BEDROHUNGSANALYSE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkWie der Angreifer das Ziel erreichtAttack ComplexityLowBedingungen zur erfolgreichen AusnutzungPrivileges RequiredNoneErforderliche AuthentifizierungsstufeUser InteractionNoneOb ein Opfer eine Aktion ausführen mussScopeUnchangedAuswirkungen über die Komponente hinausConfidentialityHighRisiko der Offenlegung sensibler DatenIntegrityHighRisiko nicht autorisierter DatenänderungAvailabilityHighRisiko der Dienstunterbrechungnextguardhq.com · CVSS v3.1 Basis-Score
Was bedeuten diese Metriken?
Attack Vector
Netzwerk — aus der Ferne über das Internet ausnutzbar. Kein physischer oder lokaler Zugriff erforderlich.
Attack Complexity
Niedrig — keine besonderen Bedingungen erforderlich. Zuverlässig ausnutzbar.
Privileges Required
Keine — ohne Authentifizierung ausnutzbar. Keine Zugangsdaten erforderlich.
User Interaction
Keine — automatischer und lautloser Angriff. Das Opfer tut nichts.
Scope
Unverändert — Auswirkung auf das anfällige Komponente beschränkt.
Confidentiality
Hoch — vollständiger Vertraulichkeitsverlust. Angreifer kann alle Daten lesen.
Integrity
Hoch — Angreifer kann beliebige Daten schreiben, ändern oder löschen.
Availability
Hoch — vollständiger Absturz oder Ressourcenerschöpfung. Totaler Denial of Service.

Betroffene Software

Komponentecisco-nexus-dashboard
HerstellerCisco
Betroffener BereichBehoben in
n/a – n/a

Schwachstellen-Klassifikation (CWE)

Zeitleiste

  1. Reserviert
  2. Veröffentlicht
  3. Geändert
  4. EPSS aktualisiert
Kein Patch — 1403 Tage seit Offenlegung

Mitigation und Workaroundswird übersetzt…

Due to the lack of a specified fixed version, immediate mitigation strategies are crucial. Cisco is expected to release a patch soon. Until then, consider implementing network segmentation to isolate the Cisco Nexus Dashboard instance from critical systems. Implement strict access controls and multi-factor authentication where possible. Monitor network traffic for suspicious activity, particularly requests targeting the vulnerable endpoints. Consider using a Web Application Firewall (WAF) to filter malicious requests. Regularly review and update firewall rules to block known attack patterns. Once a patch is released by Cisco, apply it immediately and verify functionality after the upgrade.

So beheben

Aktualisieren Sie Cisco Nexus Dashboard auf die neueste verfügbare Version, die von Cisco bereitgestellt wird. Weitere spezifische Informationen zu den betroffenen Versionen und den Korrekturen finden Sie im Cisco Security Advisory.

CVE-Sicherheitsnewsletter

Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.

Häufig gestellte Fragenwird übersetzt…

What is CVE-2022-20858 — Command Execution in Cisco Nexus Dashboard?

CVE-2022-20858 is a critical vulnerability in Cisco Nexus Dashboard allowing unauthenticated attackers to execute commands, read/upload container images, or perform CSRF attacks.

Am I affected by CVE-2022-20858 in Cisco Nexus Dashboard?

If you are running a version of Cisco Nexus Dashboard prior to the fixed version (currently unspecified), you are potentially affected by this vulnerability.

How do I fix CVE-2022-20858 in Cisco Nexus Dashboard?

Upgrade to the fixed version of Cisco Nexus Dashboard as soon as it becomes available. Until then, implement network segmentation and WAF rules as temporary mitigations.

Is CVE-2022-20858 being actively exploited?

While active exploitation is not yet confirmed, the critical severity and lack of authentication suggest a high likelihood of exploitation once public exploits become available.

Where can I find the official Cisco advisory for CVE-2022-20858?

Refer to the official Cisco Security Advisory for detailed information and updates: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nexus-dashboard-command-injection-csrf-september-2022

Ist dein Projekt betroffen?

Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.