First published: Thu Apr 19 2018(Updated: )
A vulnerability in the web framework of the Cisco Digital Network Architecture Center (DNA Center) could allow an unauthenticated, remote attacker to communicate with the Kong API server without restriction. The vulnerability is due to an overly permissive Cross Origin Resource Sharing (CORS) policy. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. An exploit could allow the attacker to communicate with the API and exfiltrate sensitive information. Cisco Bug IDs: CSCvh99208.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0269 has a medium severity rating, indicating a moderate risk to affected systems.
To mitigate CVE-2018-0269, ensure that the Cisco DNA Center is updated to an unaffected version that addresses the CORS policy issue.
CVE-2018-0269 affects the Cisco Digital Network Architecture Center version 1.1.
CVE-2018-0269 can be exploited by unauthenticated remote attackers due to its overly permissive CORS policy.
Exploitation of CVE-2018-0269 could allow attackers to communicate with the Kong API server without restrictions, potentially leading to unauthorized access.