HomeCiscoCVE-2025-20344

CVE-2025-20344

MEDIUM
6.5CVSS
Published: 2025-08-27
Updated: 2025-09-08
AI Analysis

Description

A vulnerability in the backup restore functionality of Cisco Nexus Dashboard could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. This vulnerability is due to insufficient validation of the contents of a backup file. An attacker with valid Administrator credentials could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to gain root privileges on the underlying shell on the affected device.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
high
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-22

Metadata

Primary Vendor
CISCO
Published
8/27/2025
Last Modified
9/8/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cisco : nexus_dashboard

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief