CVE-2018-0258
Cisco Nexus Dashboard Fabric Controller vulnerability analysis and mitigation

A vulnerability in the Cisco Prime File Upload servlet affecting multiple Cisco products could allow a remote attacker to upload arbitrary files to any directory of a vulnerable device (aka Path Traversal) and execute those files. This vulnerability affects the following products: Cisco Prime Data Center Network Manager (DCNM) Version 10.0 and later, and Cisco Prime Infrastructure (PI) All versions. Cisco Bug IDs: CSCvf32411, CSCvf81727.


SourceNVD

Related Cisco Nexus Dashboard Fabric Controller vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2018-0258CRITICAL9.8
  • Cisco Nexus Dashboard Fabric ControllerCisco Nexus Dashboard Fabric Controller
  • cpe:2.3:a:cisco:prime_data_center_network_manager
NoNoMay 02, 2018
CVE-2017-6640CRITICAL9.8
  • Cisco Nexus Dashboard Fabric ControllerCisco Nexus Dashboard Fabric Controller
  • cpe:2.3:a:cisco:prime_data_center_network_manager
NoYesJun 08, 2017
CVE-2018-0464HIGH8.1
  • Cisco Nexus Dashboard Fabric ControllerCisco Nexus Dashboard Fabric Controller
  • cpe:2.3:a:cisco:prime_data_center_network_manager
NoYesOct 05, 2018
CVE-2020-3539MEDIUM6.3
  • Cisco Nexus Dashboard Fabric ControllerCisco Nexus Dashboard Fabric Controller
  • cpe:2.3:a:cisco:prime_data_center_network_manager
NoNoNov 18, 2024
CVE-2018-0144MEDIUM6.1
  • Cisco Nexus Dashboard Fabric ControllerCisco Nexus Dashboard Fabric Controller
  • cpe:2.3:a:cisco:prime_data_center_network_manager
NoNoMar 08, 2018

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management