6.7
CVSSv3

CVE-2024-20399

CVSSv4: NA | CVSSv3: 6.7 | CVSSv2: NA | VMScore: 770 | EPSS: 0.00167 | KEV: Exploitation Reported
Published: 01/07/2024 Updated: 27/01/2025

Vulnerability Summary

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the malicious user to execute arbitrary commands on the underlying operating system with the privileges of root. Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges: Nexus 3000 Series Switches Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later Nexus 9000 Series Switches in standalone NX-OS mode

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco nx-os 6.0(2)A6(1)

cisco nx-os 6.0(2)A6(1a)

cisco nx-os 6.0(2)A6(2)

cisco nx-os 6.0(2)A6(2a)

cisco nx-os 6.0(2)A6(3)

cisco nx-os 6.0(2)A6(3a)

cisco nx-os 6.0(2)A6(4)

cisco nx-os 6.0(2)A6(4a)

cisco nx-os 6.0(2)A6(5a)

cisco nx-os 6.0(2)A6(5b)

cisco nx-os 6.0(2)A6(6)

cisco nx-os 6.0(2)A6(7)

cisco nx-os 6.0(2)A6(8)

cisco nx-os 6.0(2)A8(1)

cisco nx-os 6.0(2)A8(2)

cisco nx-os 6.0(2)A8(3)

cisco nx-os 6.0(2)A8(4)

cisco nx-os 6.0(2)A8(4a)

cisco nx-os 6.0(2)A8(5)

cisco nx-os 6.0(2)A8(6)

cisco nx-os 6.0(2)A8(7)

cisco nx-os 6.0(2)A8(7a)

cisco nx-os 6.0(2)A8(7b)

cisco nx-os 6.0(2)A8(8)

cisco nx-os 6.0(2)A8(9)

cisco nx-os 6.0(2)A8(10a)

cisco nx-os 6.0(2)A8(10)

cisco nx-os 6.0(2)A8(11)

cisco nx-os 6.0(2)A8(11a)

cisco nx-os 6.0(2)A8(11b)

cisco nx-os 6.0(2)U6(1)

cisco nx-os 6.0(2)U6(2)

cisco nx-os 6.0(2)U6(3)

cisco nx-os 6.0(2)U6(4)

cisco nx-os 6.0(2)U6(5)

cisco nx-os 6.0(2)U6(6)

cisco nx-os 6.0(2)U6(7)

cisco nx-os 6.0(2)U6(8)

cisco nx-os 6.0(2)U6(1a)

cisco nx-os 6.0(2)U6(2a)

cisco nx-os 6.0(2)U6(3a)

cisco nx-os 6.0(2)U6(4a)

cisco nx-os 6.0(2)U6(5a)

cisco nx-os 6.0(2)U6(5b)

cisco nx-os 6.0(2)U6(5c)

cisco nx-os 6.0(2)U6(9)

cisco nx-os 6.0(2)U6(10)

cisco nx-os 6.2(2)

cisco nx-os 6.2(2a)

cisco nx-os 6.2(6)

cisco nx-os 6.2(6b)

cisco nx-os 6.2(8)

cisco nx-os 6.2(8a)

cisco nx-os 6.2(8b)

cisco nx-os 6.2(10)

cisco nx-os 6.2(12)

cisco nx-os 6.2(18)

cisco nx-os 6.2(16)

cisco nx-os 6.2(14)

cisco nx-os 6.2(6a)

cisco nx-os 6.2(20)

cisco nx-os 6.2(1)

cisco nx-os 6.2(5b)

cisco nx-os 6.2(9)

cisco nx-os 6.2(9a)

cisco nx-os 6.2(9b)

cisco nx-os 6.2(11)

cisco nx-os 6.2(13a)

cisco nx-os 6.2(13b)

cisco nx-os 6.2(17)

cisco nx-os 6.2(20a)

cisco nx-os 6.2(22)

cisco nx-os 6.2(27)

cisco nx-os 6.2(29)

cisco nx-os 6.2(24)

cisco nx-os 6.2(24a)

cisco nx-os 6.2(33)

cisco nx-os 7.0(3)F1(1)

cisco nx-os 7.0(3)F2(1)

cisco nx-os 7.0(3)F2(2)

cisco nx-os 7.0(3)F3(1)

cisco nx-os 7.0(3)F3(3)

cisco nx-os 7.0(3)F3(3a)

cisco nx-os 7.0(3)F3(4)

cisco nx-os 7.0(3)F3(3c)

cisco nx-os 7.0(3)F3(5)

cisco nx-os 7.0(3)I4(1)

cisco nx-os 7.0(3)I4(2)

cisco nx-os 7.0(3)I4(3)

cisco nx-os 7.0(3)I4(4)

cisco nx-os 7.0(3)I4(5)

cisco nx-os 7.0(3)I4(6)

cisco nx-os 7.0(3)I4(7)

cisco nx-os 7.0(3)I4(8)

cisco nx-os 7.0(3)I4(8a)

cisco nx-os 7.0(3)I4(8b)

cisco nx-os 7.0(3)I4(8z)

cisco nx-os 7.0(3)I4(9)

cisco nx-os 7.0(3)I5(1)

cisco nx-os 7.0(3)I5(2)

cisco nx-os 7.0(3)I6(1)

cisco nx-os 7.0(3)I6(2)

cisco nx-os 7.0(3)I7(1)

cisco nx-os 7.0(3)I7(2)

cisco nx-os 7.0(3)I7(3)

cisco nx-os 7.0(3)I7(4)

cisco nx-os 7.0(3)I7(5)

cisco nx-os 7.0(3)I7(5a)

cisco nx-os 7.0(3)I7(6)

cisco nx-os 7.0(3)I7(7)

cisco nx-os 7.0(3)I7(8)

cisco nx-os 7.0(3)I7(9)

cisco nx-os 7.0(3)I7(10)

cisco nx-os 7.1(0)N1(1a)

cisco nx-os 7.1(0)N1(1b)

cisco nx-os 7.1(0)N1(1)

cisco nx-os 7.1(1)N1(1)

cisco nx-os 7.1(2)N1(1)

cisco nx-os 7.1(3)N1(1)

cisco nx-os 7.1(3)N1(2)

cisco nx-os 7.1(4)N1(1)

cisco nx-os 7.1(5)N1(1)

cisco nx-os 7.1(5)N1(1b)

cisco nx-os 7.2(0)D1(1)

cisco nx-os 7.2(1)D1(1)

cisco nx-os 7.2(2)D1(2)

cisco nx-os 7.2(2)D1(1)

cisco nx-os 7.3(0)D1(1)

cisco nx-os 7.3(0)DX(1)

cisco nx-os 7.3(0)N1(1)

cisco nx-os 7.3(1)D1(1)

cisco nx-os 7.3(1)N1(1)

cisco nx-os 7.3(2)D1(1)

cisco nx-os 7.3(2)D1(2)

cisco nx-os 7.3(2)D1(3)

cisco nx-os 7.3(2)D1(3a)

cisco nx-os 7.3(2)N1(1)

cisco nx-os 7.3(3)N1(1)

cisco nx-os 8.0(1)

cisco nx-os 8.1(1)

cisco nx-os 8.1(2)

cisco nx-os 8.1(2a)

cisco nx-os 8.1(1b)

cisco nx-os 8.2(1)

cisco nx-os 8.2(2)

cisco nx-os 8.2(3)

cisco nx-os 8.2(4)

cisco nx-os 8.2(5)

cisco nx-os 8.2(6)

cisco nx-os 8.2(7)

cisco nx-os 8.2(7a)

cisco nx-os 8.2(8)

cisco nx-os 8.2(9)

cisco nx-os 8.2(10)

cisco nx-os 8.2(11)

cisco nx-os 8.3(1)

cisco nx-os 8.3(2)

cisco nx-os 9.2(1)

cisco nx-os 9.2(2)

cisco nx-os 9.2(2t)

cisco nx-os 9.2(3)

cisco nx-os 9.2(4)

cisco nx-os 9.2(2v)

cisco nx-os 7.3(4)N1(1)

cisco nx-os 7.3(3)D1(1)

cisco nx-os 7.3(4)D1(1)

cisco nx-os 7.3(5)N1(1)

cisco nx-os 8.4(1)

cisco nx-os 8.4(2)

cisco nx-os 8.4(3)

cisco nx-os 8.4(2b)

cisco nx-os 8.4(4)

cisco nx-os 8.4(2c)

cisco nx-os 8.4(4a)

cisco nx-os 8.4(5)

cisco nx-os 8.4(6)

cisco nx-os 8.4(6a)

cisco nx-os 8.4(7)

cisco nx-os 8.4(2f)

cisco nx-os 8.4(8)

cisco nx-os 8.4(9)

cisco nx-os 9.3(1)

cisco nx-os 9.3(2)

cisco nx-os 9.3(3)

cisco nx-os 9.3(4)

cisco nx-os 9.3(5)

cisco nx-os 9.3(6)

cisco nx-os 9.3(7)

cisco nx-os 9.3(7a)

cisco nx-os 9.3(8)

cisco nx-os 9.3(9)

cisco nx-os 9.3(10)

cisco nx-os 9.3(11)

cisco nx-os 9.3(2a)

cisco nx-os 9.3(12)

cisco nx-os 9.3(13)

cisco nx-os 7.3(6)N1(1)

cisco nx-os 7.3(5)D1(1)

cisco nx-os 7.3(7)N1(1)

cisco nx-os 7.3(7)N1(1a)

cisco nx-os 7.3(7)N1(1b)

cisco nx-os 7.3(6)D1(1)

cisco nx-os 7.3(8)N1(1)

cisco nx-os 7.3(7)D1(1)

cisco nx-os 7.3(9)N1(1)

cisco nx-os 10.1(1)

cisco nx-os 8.5(1)

cisco nx-os 7.3(10)N1(1)

cisco nx-os 7.3(8)D1(1)

cisco nx-os 10.2(1)

cisco nx-os 10.2(1q)

cisco nx-os 10.2(2)

cisco nx-os 10.2(3)

cisco nx-os 10.2(3t)

cisco nx-os 7.3(9)D1(1)

cisco nx-os 7.3(11)N1(1)

cisco nx-os 7.3(12)N1(1)

cisco nx-os 10.3(1)

cisco nx-os 10.3(3)

cisco nx-os 10.3(99w)

cisco nx-os 10.3(99x)

cisco nx-os 10.3(4a)

cisco nx-os 10.3(5)

cisco nx-os 7.3(13)N1(1)

cisco nx-os 7.3(14)N1(1)

cisco nx-os 10.4(1)

cisco nx-os 10.4(2)

cisco cisco nx-os software

cisco nx-os 7.2(0)d1(1)

cisco nx-os 7.2(1)d1(1)

cisco nx-os 7.2(2)d1(1)

cisco nx-os 7.2(2)d1(2)

cisco nx-os 7.3(0)d1(1)

cisco nx-os 7.3(0)dx(1)

cisco nx-os 7.3(1)d1(1)

cisco nx-os 7.3(2)d1(1)

cisco nx-os 7.3(2)d1(2)

cisco nx-os 7.3(2)d1(3)

cisco nx-os 7.3(2)d1(3a)

cisco nx-os 7.3(3)d1(1)

cisco nx-os 7.3(4)d1(1)

cisco nx-os 7.3(5)d1(1)

cisco nx-os 7.3(6)d1(1)

cisco nx-os 7.3(7)d1(1)

cisco nx-os 7.3(8)d1(1)

cisco nx-os 7.3(9)d1(1)

cisco nx-os 6.2(3)

cisco nx-os 6.2(5)

cisco nx-os 6.2(5a)

cisco nx-os 6.2(7)

cisco nx-os 6.2(9c)

cisco nx-os 6.2(11b)

cisco nx-os 6.2(11c)

cisco nx-os 6.2(11d)

cisco nx-os 6.2(11e)

cisco nx-os 6.2(13)

cisco nx-os 6.2(15)

cisco nx-os 6.2(19)

cisco nx-os 6.2(21)

cisco nx-os 6.2(23)

cisco nx-os 6.2(25)

cisco nx-os 6.2(31)

cisco nx-os 7.3(0)dy(1)

cisco nx-os 7.3(1)dy(1)

cisco nx-os 8.1(1a)

cisco nx-os 8.4(1a)

cisco nx-os 8.4(2a)

cisco nx-os 8.4(2d)

cisco nx-os 8.4(2e)

cisco nx-os 9.2(1a)

cisco nx-os 9.4(1)

cisco nx-os 9.4(1a)

cisco nx-os 9.4(2)

cisco nx-os 6.0(2)a6(1)

cisco nx-os 6.0(2)a6(1a)

cisco nx-os 6.0(2)a6(2)

cisco nx-os 6.0(2)a6(2a)

cisco nx-os 6.0(2)a6(3)

cisco nx-os 6.0(2)a6(3a)

cisco nx-os 6.0(2)a6(4)

cisco nx-os 6.0(2)a6(4a)

cisco nx-os 6.0(2)a6(5)

cisco nx-os 6.0(2)a6(5a)

cisco nx-os 6.0(2)a6(5b)

cisco nx-os 6.0(2)a6(6)

cisco nx-os 6.0(2)a6(7)

cisco nx-os 6.0(2)a6(8)

cisco nx-os 6.0(2)a8(1)

cisco nx-os 6.0(2)a8(2)

cisco nx-os 6.0(2)a8(3)

cisco nx-os 6.0(2)a8(4)

cisco nx-os 6.0(2)a8(4a)

cisco nx-os 6.0(2)a8(5)

cisco nx-os 6.0(2)a8(6)

cisco nx-os 6.0(2)a8(7)

cisco nx-os 6.0(2)a8(7a)

cisco nx-os 6.0(2)a8(7b)

cisco nx-os 6.0(2)a8(8)

cisco nx-os 6.0(2)a8(9)

cisco nx-os 6.0(2)a8(10)

cisco nx-os 6.0(2)a8(10a)

cisco nx-os 6.0(2)a8(11)

cisco nx-os 6.0(2)a8(11a)

cisco nx-os 6.0(2)a8(11b)

cisco nx-os 6.0(2)u6(1)

cisco nx-os 6.0(2)u6(1a)

cisco nx-os 6.0(2)u6(2)

cisco nx-os 6.0(2)u6(2a)

cisco nx-os 6.0(2)u6(3)

cisco nx-os 6.0(2)u6(3a)

cisco nx-os 6.0(2)u6(4)

cisco nx-os 6.0(2)u6(4a)

cisco nx-os 6.0(2)u6(5)

cisco nx-os 6.0(2)u6(5a)

cisco nx-os 6.0(2)u6(5b)

cisco nx-os 6.0(2)u6(5c)

cisco nx-os 6.0(2)u6(6)

cisco nx-os 6.0(2)u6(7)

cisco nx-os 6.0(2)u6(8)

cisco nx-os 6.0(2)u6(9)

cisco nx-os 6.0(2)u6(10)

cisco nx-os 7.0(3)f1(1)

cisco nx-os 7.0(3)f2(1)

cisco nx-os 7.0(3)f2(2)

cisco nx-os 7.0(3)f3(1)

cisco nx-os 7.0(3)f3(2)

cisco nx-os 7.0(3)f3(3)

cisco nx-os 7.0(3)f3(3a)

cisco nx-os 7.0(3)f3(3c)

cisco nx-os 7.0(3)f3(4)

cisco nx-os 7.0(3)f3(5)

cisco nx-os 7.0(3)i4(1)

cisco nx-os 7.0(3)i4(2)

cisco nx-os 7.0(3)i4(3)

cisco nx-os 7.0(3)i4(4)

cisco nx-os 7.0(3)i4(5)

cisco nx-os 7.0(3)i4(6)

cisco nx-os 7.0(3)i4(7)

cisco nx-os 7.0(3)i4(8)

cisco nx-os 7.0(3)i4(8a)

cisco nx-os 7.0(3)i4(8b)

cisco nx-os 7.0(3)i4(8z)

cisco nx-os 7.0(3)i4(9)

cisco nx-os 7.0(3)i5(1)

cisco nx-os 7.0(3)i5(2)

cisco nx-os 7.0(3)i6(1)

cisco nx-os 7.0(3)i6(2)

cisco nx-os 7.0(3)i7(1)

cisco nx-os 7.0(3)i7(2)

cisco nx-os 7.0(3)i7(3)

cisco nx-os 7.0(3)i7(4)

cisco nx-os 7.0(3)i7(5)

cisco nx-os 7.0(3)i7(5a)

cisco nx-os 7.0(3)i7(6)

cisco nx-os 7.0(3)i7(7)

cisco nx-os 7.0(3)i7(8)

cisco nx-os 7.0(3)i7(9)

cisco nx-os 7.0(3)i7(10)

cisco nx-os 10.1(2)

cisco nx-os 10.2(4)

cisco nx-os 10.2(5)

cisco nx-os 10.2(6)

cisco nx-os 10.2(7)

cisco nx-os 10.2(8)

cisco nx-os 10.3(2)

cisco nx-os 7.1(0)n1(1)

cisco nx-os 7.1(0)n1(1a)

cisco nx-os 7.1(0)n1(1b)

cisco nx-os 7.1(1)n1(1)

cisco nx-os 7.1(2)n1(1)

cisco nx-os 7.1(3)n1(1)

cisco nx-os 7.1(3)n1(2)

cisco nx-os 7.1(4)n1(1)

cisco nx-os 7.1(5)n1(1)

cisco nx-os 7.1(5)n1(1b)

cisco nx-os 7.3(0)n1(1)

cisco nx-os 7.3(1)n1(1)

cisco nx-os 7.3(2)n1(1)

cisco nx-os 7.3(3)n1(1)

cisco nx-os 7.3(4)n1(1)

cisco nx-os 7.3(5)n1(1)

cisco nx-os 7.3(6)n1(1)

cisco nx-os 7.3(7)n1(1)

cisco nx-os 7.3(7)n1(1a)

cisco nx-os 7.3(7)n1(1b)

cisco nx-os 7.3(8)n1(1)

cisco nx-os 7.3(9)n1(1)

cisco nx-os 7.3(10)n1(1)

cisco nx-os 7.3(11)n1(1)

cisco nx-os 7.3(12)n1(1)

cisco nx-os 7.3(13)n1(1)

cisco nx-os 7.3(14)n1(1)

Vendor Advisories

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands An a ...

Github Repositories

Private exploit for Cisco Nexus giving RCE

CVE-2024-20399-Cisco-RCE Private exploit for Cisco Nexus giving RCE

Recent Articles

Cisco bug lets hackers run commands as root on UWRB access points
BleepingComputer • Sergiu Gatlan • 06 Nov 2024

Cisco bug lets hackers run commands as root on UWRB access points By Sergiu Gatlan November 6, 2024 02:34 PM 0 Cisco has fixed a maximum severity vulnerability that allows attackers to run commands with root privileges on vulnerable Ultra-Reliable Wireless Backhaul (URWB) access points that provide connectivity for industrial wireless automation. Tracked as CVE-2024-20418, this security flaw was found in Cisco's Unified Industrial Wireless Software's web-based management interface. Unauthenticat...

Cisco warns of backdoor admin account in Smart Licensing Utility
BleepingComputer • Sergiu Gatlan • 04 Sep 2024

Cisco warns of backdoor admin account in Smart Licensing Utility By Sergiu Gatlan September 4, 2024 12:58 PM 0 Cisco has removed a backdoor account in the Cisco Smart Licensing Utility (CSLU) that can be used to log into unpatched systems with administrative privileges. CSLU is a Windows application that helps manage licenses and linked products on-premise without connecting them to Cisco's cloud-based Smart Software Manager solution. The company says this critical vulnerability (CVE-2024-20439)...

Exploit released for Cisco SSM bug allowing admin password changes
BleepingComputer • Sergiu Gatlan • 08 Aug 2024

Exploit released for Cisco SSM bug allowing admin password changes By Sergiu Gatlan August 8, 2024 03:01 PM 0 Cisco warns that exploit code is now available for a maximum severity vulnerability that lets attackers change any user password on unpatched Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers. As a Cisco Smart Licensing component, Cisco SSM On-Prem helps manage accounts and product licenses on an organization's environment using a dedicated dashboard on the local n...

Cisco SSM On-Prem bug lets hackers change any user's password
BleepingComputer • Sergiu Gatlan • 17 Jul 2024

Cisco SSM On-Prem bug lets hackers change any user's password By Sergiu Gatlan July 17, 2024 01:31 PM 0 Cisco has fixed a maximum severity vulnerability that allows attackers to change any user's password on vulnerable Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers, including administrators. The flaw also impacts SSM On-Prem installations earlier than Release 7.0, known as Cisco Smart Software Manager Satellite (SSM Satellite). As a Cisco Smart Licensing component, SSM ...

CISA urges devs to weed out OS command injection vulnerabilities
BleepingComputer • Sergiu Gatlan • 10 Jul 2024

CISA urges devs to weed out OS command injection vulnerabilities By Sergiu Gatlan July 10, 2024 02:02 PM 0 ​CISA and the FBI urged software companies on Wednesday to review their products and eliminate path OS command injection vulnerabilities before shipping. The advisory was released in response to recent attacks that exploited multiple OS command injection security flaws (CVE-2024-20399, CVE-2024-3400, and CVE-2024-21887) to compromise Cisco, Palo Alto, and Ivanti network edge devices. Velv...

Cisco warns of NX-OS zero-day exploited to deploy custom malware
BleepingComputer • Sergiu Gatlan • 01 Jul 2024

Cisco warns of NX-OS zero-day exploited to deploy custom malware By Sergiu Gatlan July 1, 2024 01:46 PM 0 Cisco has patched an NX-OS zero-day exploited in April attacks to install previously unknown malware as root on vulnerable switches. Cybersecurity firm Sygnia, who reported the incidents to Cisco, linked the attacks to a Chinese state-sponsored threat actor it tracks as Velvet Ant. "Sygnia detected this exploitation during a larger forensic investigation into the China-nexus cybere...