Home

Description

A vulnerability in the REST API endpoints of Cisco Nexus Dashboard and Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to view sensitive information or upload and modify files on an affected device. This vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit th vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions, such as accessing sensitive information regarding HTTP Proxy and NTP configurations, uploading images, and damaging image files on an affected device.

PUBLISHED Reserved 2024-10-10 | Published 2025-08-27 | Updated 2025-08-27 | Assigner cisco




MEDIUM: 5.0CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Problem types

Exposure of Sensitive Information Through Sent Data

Product status

Default status
unknown

1.1(3e)
affected

1.1(3c)
affected

1.1(3d)
affected

1.1(0d)
affected

1.1(2i)
affected

2.0(1b)
affected

1.1(2h)
affected

1.1(0c)
affected

1.1(3f)
affected

2.1(1d)
affected

2.1(1e)
affected

2.0(2g)
affected

2.0(2h)
affected

2.1(2d)
affected

2.0(1d)
affected

2.2(1h)
affected

2.2(1e)
affected

2.2(2d)
affected

2.1(2f)
affected

2.3(1c)
affected

2.3(2b)
affected

2.3(2c)
affected

2.3(2d)
affected

2.3(2e)
affected

3.0(1f)
affected

3.0(1i)
affected

3.1(1k)
affected

3.1(1l)
affected

3.2(1e)
affected

3.2(1i)
affected

3.3(1a)
affected

3.3(1b)
affected

3.3(2b)
affected

4.0(1i)
affected

3.3(2g)
affected

3.2(2f)
affected

3.2(2g)
affected

3.2(2m)
affected

3.1(1n)
affected

References

sec.cloudapps.cisco.com/...sory/cisco-sa-nshs-urapi-gJuBVFpu (cisco-sa-nshs-urapi-gJuBVFpu)

cve.org (CVE-2025-20348)

nvd.nist.gov (CVE-2025-20348)

Download JSON