CVE-2024-20448: Cisco NDFC Backup File Information Disclosure
CVE-2024-20448 Published on October 2, 2024
Cisco Nexus Dashboard Fabric Controller Credential Information Disclosure Vulnerability
A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information.
This vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key.
Vulnerability Analysis
CVE-2024-20448 is exploitable with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
Cleartext Storage in a File or on Disk
The application stores sensitive information in cleartext in a file, or on disk. The sensitive information could be read by attackers with access to the file, or with physical or administrator access to the raw disk. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
Products Associated with CVE-2024-20448
Want to know whenever a new CVE is published for Cisco Nexus Dashboard Fabric Controller? stack.watch will email you.
Affected Versions
Cisco Data Center Network Manager:- Version 11.2(1) is affected.
- Version 7.0(2) is affected.
- Version 10.3(2)IPFM is affected.
- Version 10.1(1) is affected.
- Version 7.2(3) is affected.
- Version 7.2(2) is affected.
- Version 7.2(1) is affected.
- Version 11.0(1) is affected.
- Version 10.4(1) is affected.
- Version 10.2(1) is affected.
- Version 7.2(2a) is affected.
- Version 10.1(2) is affected.
- Version 7.1(1) is affected.
- Version 12.1(1) is affected.
- Version 11.1(1) is affected.
- Version 10.3(1) is affected.
- Version 10.3(1)R(1) is affected.
- Version 7.0(1) is affected.
- Version 10.0(1) is affected.
- Version 7.1(2) is affected.
- Version 11.4(1) is affected.
- Version 10.4(2) is affected.
- Version 11.3(1) is affected.
- Version 11.5(1) is affected.
- Version 11.5(2) is affected.
- Version 11.5(3) is affected.
- Version 12.0.1a is affected.
- Version 11.5(3a) is affected.
- Version 12.0.2d is affected.
- Version 12.0.2f is affected.
- Version 11.5(4) is affected.
- Version 12.1.1 is affected.
- Version 12.1.1e is affected.
- Version 12.1.1p is affected.
- Version 12.1.2e is affected.
- Version 12.1.2p is affected.
- Version 12.1.3b is affected.
- Version 12.2.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.