{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T12:41:13.991","vulnerabilities":[{"cve":{"id":"CVE-2023-48700","sourceIdentifier":"security-advisories@github.com","published":"2023-11-21T23:15:08.307","lastModified":"2024-11-21T08:32:17.143","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify the onboarding process of a new device into Nautobot down to, in many cases, an IP Address and a Location. Starting in version 2.0.0 and prior to version 3.0.0, credentials provided to onboarding task are visible via Job Results from an execution of an Onboarding Task. Version 3.0.0 fixes this issue; no known workarounds are available. Mitigation recommendations include deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, upgrading to v3.0.0, and rotating any exposed credentials."},{"lang":"es","value":"El complemento Nautobot Device Onboarding utiliza las librerías netmiko y NAPALM para simplificar el proceso de incorporación de un nuevo dispositivo a Nautobot hasta, en muchos casos, una dirección IP y una ubicación. A partir de la versión 2.0.0 y anteriores a la versión 3.0.0, las credenciales proporcionadas para la tarea de incorporación son visibles a través de los resultados del trabajo desde la ejecución de una tarea de incorporación. La versión 3.0.0 soluciona este problema; no hay workarounds conocidos disponibles. Las recomendaciones de mitigación incluyen eliminar todos los resultados del trabajo para cualquier tarea de incorporación para eliminar las credenciales de texto plano de las entradas de la base de datos que se ejecutaron en la versión 2.0.X, actualizar a la versión 3.0.0 y rotar las credenciales expuestas."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-256"},{"lang":"en","value":"CWE-312"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nautobot:nautobot-plugin-device-onboarding:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"3.0.0","matchCriteriaId":"1974D38A-2A2A-4498-95A1-C9EB2137CB43"}]}]}],"references":[{"url":"https://github.com/nautobot/nautobot-plugin-device-onboarding/security/advisories/GHSA-qf3c-rw9f-jh7v","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/nautobot/nautobot-plugin-device-onboarding/security/advisories/GHSA-qf3c-rw9f-jh7v","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}