CWE
862 16
Advisory Published
Updated

CVE-2017-6639

First published: Thu Jun 08 2017(Updated: )

A vulnerability in the role-based access control (RBAC) functionality of Cisco Prime Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to access sensitive information or execute arbitrary code with root privileges on an affected system. The vulnerability is due to the lack of authentication and authorization mechanisms for a debugging tool that was inadvertently enabled in the affected software. An attacker could exploit this vulnerability by remotely connecting to the debugging tool via TCP. A successful exploit could allow the attacker to access sensitive information about the affected software or execute arbitrary code with root privileges on the affected system. This vulnerability affects Cisco Prime Data Center Network Manager (DCNM) Software Releases 10.1(1) and 10.1(2) for Microsoft Windows, Linux, and Virtual Appliance platforms. Cisco Bug IDs: CSCvd09961.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Prime Data Center Network Manager (DCNM)=10.1\(1\)
Cisco Prime Data Center Network Manager (DCNM)=10.1\(2\)
Cisco Prime Data Center Network Manager (DCNM)=10.1.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2017-6639?

    CVE-2017-6639 is considered a critical vulnerability due to its potential to allow unauthorized access and execution of arbitrary code.

  • How do I fix CVE-2017-6639?

    To mitigate CVE-2017-6639, update Cisco Prime Data Center Network Manager to the latest patched version as recommended by Cisco.

  • What are the affected versions in CVE-2017-6639?

    CVE-2017-6639 affects Cisco Prime Data Center Network Manager versions 10.1(1), 10.1(2), and 10.1.0.

  • Can CVE-2017-6639 be exploited remotely?

    Yes, CVE-2017-6639 can be exploited by unauthenticated remote attackers.

  • What are the potential impacts of CVE-2017-6639?

    The impacts of CVE-2017-6639 include unauthorized access to sensitive information and the ability to execute arbitrary code with root privileges.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203