Impact
A Cisco Nexus Dashboard Insights vulnerability allows an authenticated, remote attacker who possesses valid administrative credentials to craft and upload a modified metadata file, leading to arbitrary file writes on the device’s underlying operating system as the root user. This weakness falls under the file path traversal category and enables the attacker to modify system files, potentially compromising confidentiality, integrity, or availability of the affected system.
Affected Systems
Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights are the impacted products. The exact affected software versions are not listed in the advisory, but the flaw exists in any deployment that supports the metadata update feature, including both air‑gap and cloud‑connected environments.
Risk and Exploitability
The CVSS score is 4.9, indicating moderate severity. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated remote access; an attacker would need legitimate administrative credentials. The likely attack vector is remote, authenticated file upload. Due to the requirement for credentials, the risk to systems with strong access controls is lower, but not negligible if administrative credentials are compromised.
OpenCVE Enrichment