CRITICALCVE-2022-20861CVSS 9.8

Cisco Nexus Dashboard Unbefugter Zugriff Schwachstellen

Plattform

cisco

Komponente

cisco-nexus-dashboard

AI Confidence: highNVDEPSS 0.2%Geprüft: Mai 2026
Wird in Ihre Sprache übersetzt…

CVE-2022-20861 represents a critical set of vulnerabilities within Cisco Nexus Dashboard. These flaws allow an unauthenticated, remote attacker to potentially execute arbitrary commands, read or upload container image files, or launch cross-site request forgery (CSRF) attacks. The vulnerability impacts versions of Cisco Nexus Dashboard prior to a currently unavailable fixed version, requiring immediate attention and remediation.

Auswirkungen und Angriffsszenarienwird übersetzt…

The potential impact of CVE-2022-20861 is severe. Successful exploitation of the command execution vulnerability could grant an attacker complete control over the affected Cisco Nexus Dashboard instance. This could lead to data breaches, system compromise, and disruption of network services. The ability to read or upload container image files poses a significant risk, as attackers could potentially inject malicious code into the system. CSRF attacks could be leveraged to perform unauthorized actions on behalf of legitimate users, further expanding the attack surface. Given the critical nature of the vulnerability and the potential for remote, unauthenticated exploitation, the blast radius is substantial, potentially impacting entire network infrastructures.

Ausnutzungskontextwird übersetzt…

CVE-2022-20861 is a high-priority vulnerability due to its critical CVSS score and the ease of exploitation (unauthenticated, remote). Public proof-of-concept exploits are likely to emerge, increasing the risk of widespread exploitation. The vulnerability was disclosed publicly on July 21, 2022. It is recommended to monitor CISA and Cisco advisories for updates and potential KEV listing.

Wer Ist Gefährdetwird übersetzt…

Organizations heavily reliant on Cisco Nexus Dashboard for network management and automation are particularly at risk. Environments with exposed dashboard instances or weak access controls are especially vulnerable. Shared hosting environments where multiple tenants share the same infrastructure could also be affected, potentially leading to cross-tenant attacks.

Erkennungsschrittewird übersetzt…

• cisco / network-device:

Get-CimInstance -ClassName Win32_OperatingSystem | Select-Object Caption, Version

• cisco / network-device:

ssh -o StrictHostKeyChecking=no <nexus_dashboard_ip> 'show version'

• generic web:

curl -I <nexus_dashboard_url>

• generic web:

grep -i "nexus dashboard" /var/log/apache2/access.log

Angriffszeitlinie

  1. Disclosure

    disclosure

Bedrohungsanalyse

Exploit-Status

Proof of ConceptUnbekannt
CISA KEVNO
Internet-ExponierungHoch

EPSS

0.24% (48% Perzentil)

CVSS-Vektor

BEDROHUNGSANALYSE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetworkWie der Angreifer das Ziel erreichtAttack ComplexityLowBedingungen zur erfolgreichen AusnutzungPrivileges RequiredNoneErforderliche AuthentifizierungsstufeUser InteractionNoneOb ein Opfer eine Aktion ausführen mussScopeUnchangedAuswirkungen über die Komponente hinausConfidentialityHighRisiko der Offenlegung sensibler DatenIntegrityHighRisiko nicht autorisierter DatenänderungAvailabilityHighRisiko der Dienstunterbrechungnextguardhq.com · CVSS v3.1 Basis-Score
Was bedeuten diese Metriken?
Attack Vector
Netzwerk — aus der Ferne über das Internet ausnutzbar. Kein physischer oder lokaler Zugriff erforderlich.
Attack Complexity
Niedrig — keine besonderen Bedingungen erforderlich. Zuverlässig ausnutzbar.
Privileges Required
Keine — ohne Authentifizierung ausnutzbar. Keine Zugangsdaten erforderlich.
User Interaction
Keine — automatischer und lautloser Angriff. Das Opfer tut nichts.
Scope
Unverändert — Auswirkung auf das anfällige Komponente beschränkt.
Confidentiality
Hoch — vollständiger Vertraulichkeitsverlust. Angreifer kann alle Daten lesen.
Integrity
Hoch — Angreifer kann beliebige Daten schreiben, ändern oder löschen.
Availability
Hoch — vollständiger Absturz oder Ressourcenerschöpfung. Totaler Denial of Service.

Betroffene Software

Komponentecisco-nexus-dashboard
HerstellerCisco
Betroffener BereichBehoben in
n/a – n/a

Schwachstellen-Klassifikation (CWE)

Zeitleiste

  1. Reserviert
  2. Veröffentlicht
  3. Geändert
  4. EPSS aktualisiert
Kein Patch — 1403 Tage seit Offenlegung

Mitigation und Workaroundswird übersetzt…

Due to the unavailability of a fixed version at the time of publication, immediate mitigation strategies are crucial. Implement strict network segmentation to isolate Cisco Nexus Dashboard instances from untrusted networks. Employ robust access controls and authentication mechanisms to limit access to the dashboard. Consider implementing a Web Application Firewall (WAF) with rules to detect and block malicious requests targeting known vulnerable endpoints. Closely monitor system logs for suspicious activity, particularly attempts to execute commands or access container images. Until a patch is released, prioritize hardening the environment and reducing the attack surface.

So beheben

Aktualisieren Sie Cisco Nexus Dashboard auf die neueste verfügbare Version, die von Cisco bereitgestellt wird. Weitere detaillierte Informationen zur Aktualisierung und den verfügbaren Mitigationen finden Sie im Cisco Security Advisory.

CVE-Sicherheitsnewsletter

Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.

Häufig gestellte Fragenwird übersetzt…

What is CVE-2022-20861 — Command Execution in Cisco Nexus Dashboard?

CVE-2022-20861 is a critical vulnerability in Cisco Nexus Dashboard allowing unauthenticated remote attackers to execute commands, read/upload container images, or perform CSRF attacks. It impacts versions prior to a currently unavailable fixed version.

Am I affected by CVE-2022-20861 in Cisco Nexus Dashboard?

If you are using Cisco Nexus Dashboard prior to a fixed version (currently unavailable), you are potentially affected. Assess your environment and implement mitigation strategies immediately.

How do I fix CVE-2022-20861 in Cisco Nexus Dashboard?

A fixed version is currently unavailable. Implement mitigation strategies such as network segmentation, access controls, WAF rules, and log monitoring until a patch is released.

Is CVE-2022-20861 being actively exploited?

While active exploitation is not yet confirmed, the critical nature of the vulnerability and the ease of exploitation suggest a high likelihood of exploitation in the near future.

Where can I find the official Cisco advisory for CVE-2022-20861?

Refer to the official Cisco Security Advisory for detailed information and updates: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nexus-dashboard-multiple-vulnerabilities

Ist dein Projekt betroffen?

Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.