A vulnerability in the configuration restore feature of Cisco Nexus Data Broker software could allow an unauthenticated, remote malicious user to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient validation of configuration backup files. An attacker could exploit this vulnerability by persuading an administrator to restore a crafted configuration backup file. A successful exploit could allow the malicious user to overwrite arbitrary files that are accessible through the affected software on an affected device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco nexus data broker |