{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T01:06:49.028","vulnerabilities":[{"cve":{"id":"CVE-2024-20536","sourceIdentifier":"psirt@cisco.com","published":"2024-11-06T17:15:19.140","lastModified":"2025-08-07T00:23:00.243","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in a REST API endpoint and web-based management interface of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with read-only privileges to execute arbitrary SQL commands on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to a specific REST API endpoint or web-based management interface. A successful exploit could allow the attacker to read, modify, or delete arbitrary data on an internal database, which could affect the availability of the device.&nbsp;"},{"lang":"es","value":"Una vulnerabilidad en un endpoint de API REST y una interfaz de administración basada en web de Cisco Nexus Dashboard Fabric Controller (NDFC) podría permitir que un atacante remoto autenticado con privilegios de solo lectura ejecute comandos SQL arbitrarios en un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud manipulado a un endpoint de API REST o una interfaz de administración basada en web específicos. Una explotación exitosa podría permitir que el atacante lea, modifique o elimine datos arbitrarios en una base de datos interna, lo que podría afectar la disponibilidad del dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:12.1.2:*:*:*:*:*:*:*","matchCriteriaId":"8CA48E2A-4C63-436E-807C-4EDD163781D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:12.1.3:*:*:*:*:*:*:*","matchCriteriaId":"51EE96E1-D7D3-4C58-AAA3-7A2C29B4F283"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-sqli-CyPPAxrL","source":"psirt@cisco.com","tags":["Vendor Advisory"]}]}}]}