Cisco Nexus Dashboard Path Traversal Vulnerability

SecurityVulns

A vulnerability in the backup restore functionality of Cisco Nexus Dashboard could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device.<br><br>
This vulnerability is due to insufficient validation of the contents of a backup file. An attacker with valid <em>Administrator </em>credentials could exploit this vulnerability by restoring a crafted backup file to an affected device. A successful exploit could allow the attacker to gain <em>root</em> privileges on the underlying shell on the affected device.<br><br>

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.<br><br>
This advisory is available at the following link:<br><a href=”https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ptrs-XU2Fm2Wb”>https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ptrs-XU2Fm2Wb</a><br><br>

<br/>Security Impact Rating: Medium

<br/>CVE: CVE-2025-20344Cisco Security AdvisoryRead More