{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T18:07:40.211","vulnerabilities":[{"cve":{"id":"CVE-2024-20489","sourceIdentifier":"psirt@cisco.com","published":"2024-09-11T17:15:13.393","lastModified":"2024-10-03T01:40:11.637","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the storage method of the PON Controller configuration file could allow an authenticated, local attacker with low privileges to obtain the MongoDB credentials.\r\n\r\nThis vulnerability is due to improper storage of the unencrypted database credentials on the device that is running Cisco IOS XR Software. An attacker could exploit this vulnerability by accessing the configuration files on an affected system. A successful exploit could allow the attacker to view MongoDB credentials."},{"lang":"es","value":"Una vulnerabilidad en el método de almacenamiento del archivo de configuración del controlador PON podría permitir que un atacante local autenticado con privilegios bajos obtenga las credenciales de MongoDB. Esta vulnerabilidad se debe al almacenamiento inadecuado de las credenciales de la base de datos sin cifrar en el dispositivo que ejecuta el software Cisco IOS XR. Un atacante podría aprovechar esta vulnerabilidad accediendo a los archivos de configuración en un sistema afectado. Una explotación exitosa podría permitir al atacante ver las credenciales de MongoDB."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.0,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-256"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*","matchCriteriaId":"BCE8E968-111F-4F57-93D3-E509AB540B87"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*","matchCriteriaId":"B342A550-8600-45CF-8B9A-530770C9A0F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*","matchCriteriaId":"D64E1C4D-46B0-4A18-B8EE-BEA732CBF1F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*","matchCriteriaId":"11288A28-F0CF-4FEC-A0B7-3D93866F01FE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xr:24.3.1:*:*:*:*:*:*:*","matchCriteriaId":"3FD120B9-0671-473C-8420-872E5BB9933F"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}