Cisco Nexus Dashboard Path Traversal (cisco-sa-nd-ptrs-XU2Fm2Wb)

medium Nessus Plugin ID 261455

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco Nexus Dashboard is affected by a path traversal vulnerability:

- A vulnerability in the backup restore functionality of Cisco Nexus Dashboard could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. This vulnerability is due to insufficient validation of the contents of a backup file. An attacker with valid Administrator credentials could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to gain root privileges on the underlying shell on the affected device.
(CVE-2025-20344)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwp66421

See Also

http://www.nessus.org/u?c39a03e7

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwp66421

Plugin Details

Severity: Medium

ID: 261455

File Name: cisco-sa-nd-ptrs-XU2Fm2Wb.nasl

Version: 1.1

Type: combined

Family: CISCO

Published: 9/5/2025

Updated: 9/5/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N

CVSS Score Source: CVE-2025-20344

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

CPE: cpe:/o:cisco:nexus_dashboard

Required KB Items: installed_sw/Nexus Dashboard

Patch Publication Date: 8/27/2025

Vulnerability Publication Date: 8/27/2025

Reference Information

CVE: CVE-2025-20344

CISCO-SA: cisco-sa-nd-ptrs-XU2Fm2Wb

IAVA: 2025-A-0639

CISCO-BUG-ID: CSCwp66421