CVE-2025-20348
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-27

Last updated on: 2025-09-08

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the REST API endpoints of Cisco Nexus Dashboard and Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to view sensitive information or upload and modify files on an affected device. This vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit th vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions, such as accessing sensitive information regarding HTTP Proxy and NTP configurations, uploading images, and damaging image files on an affected device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-27
Last Modified
2025-09-08
Generated
2026-05-07
AI Q&A
2025-08-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cisco nexus_dashboard to 4.1\(1g\) (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-201 The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the REST API endpoints of Cisco Nexus Dashboard and Cisco Nexus Dashboard Fabric Controller (NDFC). It allows an authenticated, low-privileged, remote attacker to bypass missing authorization controls on some REST API endpoints. By sending crafted API requests, the attacker could view sensitive information or upload and modify files on the affected device, potentially performing limited Administrator functions such as accessing HTTP Proxy and NTP configuration details and damaging image files.


How can this vulnerability impact me? :

The vulnerability could allow an attacker with low privileges to gain access to sensitive configuration information and perform limited administrative actions on the affected device. This could lead to unauthorized disclosure of sensitive data, modification or damage of important files, and potential disruption of device operations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart