Loading HuntDB...

CVE-2024-20397

MEDIUM
Published 2024-12-04T16:13:13.890Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2024-20397. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
5.2
/10
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.000
probability
of exploitation in the wild

There is a 0.0% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.136
Higher than 13.6% of all CVEs

Attack Vector Metrics

Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
LOW
Integrity
HIGH
Availability
NONE

Description

A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification. 

This vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Affected Versions:

8.2(5) 7.3(5)D1(1) 8.4(2) 8.4(3) 9.2(3) 7.0(3)I5(2) 8.2(1) 6.0(2)A8(7a) 7.0(3)I4(5) 7.3(1)D1(1) 7.0(3)I4(6) 7.0(3)I4(3) 9.2(2v) 7.3(0)D1(1) 7.0(3)I4(7) 7.0(3)I4(1) 7.0(3)I4(8) 7.0(3)I4(2) 6.0(2)A8(11) 7.3(4)D1(1) 9.2(1) 9.2(2t) 9.2(3y) 7.0(3)I4(1t) 7.0(3)I7(6z) 9.3(2) 7.3(1)DY(1) 7.0(3)F3(3) 7.0(3)I7(3z) 7.0(3)IM7(2) 6.0(2)A8(11b) 7.0(3)I7(5a) 8.1(1) 7.0(3)I6(1) 8.2(2) 7.0(3)I5(3b) 8.3(2) 7.3(2)D1(3a) 9.2(4) 6.0(2)A8(10) 6.0(2)A8(2) 7.0(3)IC4(4) 8.1(2) 7.0(3)F3(3c) 7.3(3)D1(1) 7.0(3)F3(1) 7.0(3)F3(5) 8.2(3) 7.0(3)I7(2) 7.0(3)I5(3) 7.0(3)I7(3) 6.0(2)A8(6) 7.0(3)I6(2) 8.3(1) 8.4(1) 8.1(1b) 6.0(2)A8(5) 7.3(0)DX(1) 7.3(2)D1(1) 9.3(1) 6.0(2)A8(7) 7.0(3)I7(6) 7.3(2)D1(2) 6.0(2)A8(11a) 7.0(3)I4(8z) 7.0(3)I4(9) 8.2(4) 7.0(3)I7(4) 7.0(3)I7(7) 7.3(0)DY(1) 6.0(2)A8(9) 6.0(2)A8(1) 6.0(2)A8(10a) 7.0(3)I5(1) 9.3(1z) 9.2(2) 7.0(3)F3(4) 7.0(3)I4(8b) 8.1(2a) 7.3(2)D1(3) 6.0(2)A8(3) 7.0(3)I4(6t) 7.0(3)I5(3a) 8.1(1a) 6.0(2)A8(8) 7.0(3)I7(5) 7.0(3)F3(3a) 6.0(2)A8(4) 7.0(3)I4(8a) 7.0(3)F3(2) 7.0(3)I4(4) 7.0(3)I7(1) 7.0(3)IA7(2) 7.0(3)IA7(1) 6.0(2)A8(7b) 6.0(2)A8(4a) 8.4(1a) 9.3(3) 7.3(2)D1(1d) 7.0(3)I7(8) 9.3(4) 7.3(6)D1(1) 8.2(6) 9.3(5) 8.4(2a) 8.4(2b) 7.0(3)I7(9) 8.5(1) 9.3(6) 10.1(2) 10.1(1) 8.4(4) 7.3(7)D1(1) 8.4(2c) 9.3(5w) 8.2(7) 9.3(7) 9.3(7k) 7.0(3)I7(9w) 10.2(1) 7.3(8)D1(1) 9.3(7a) 8.2(7a) 9.3(8) 8.4(4a) 8.4(2d) 8.4(5) 7.0(3)I7(10) 8.2(8) 10.2(1q) 10.2(2) 9.3(9) 10.1(2t) 7.3(9)D1(1) 10.2(3) 8.4(6) 10.2(3t) 8.4(2e) 9.3(10) 10.2(2a) 9.2(1a) 8.2(9) 10.3(1) 10.2(4) 8.4(7) 10.3(2) 8.4(6a) 9.3(11) 10.3(3) 10.2(5) 9.4(1) 9.3(2a) 8.4(2f) 8.2(10) 9.3(12) 10.2(3v) 10.4(1) 8.4(8) 10.3(99w) 10.2(6) 10.3(3w) 10.3(99x) 10.3(3o) 8.4(9) 10.3(4) 10.3(3p) 10.3(4a) 9.4(1a) 10.4(2) 10.3(3q) 9.3(13) 8.2(11) 10.3(5) 10.2(7) 10.4(3) 10.3(3x) 10.3(4g) 10.5(1) 10.2(8) 10.3(3r) 10.3(6) 9.3(14) 10.4(4) 10.3(4h) 10.4(4g)

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed MODERATE

GHSA-p5rq-7r6m-x7rf

Advisory Details

A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification. This vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software.

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

Advisory provided by GitHub Security Advisory Database. Published: December 4, 2024, Modified: December 4, 2024

References

Published: 2024-12-04T16:13:13.890Z
Last Modified: 2025-04-08T14:29:18.430Z
Copied to clipboard!