First published: Thu May 17 2018(Updated: )
A vulnerability in the API gateway of the Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and access critical services. The vulnerability is due to a failure to normalize URLs prior to servicing requests. An attacker could exploit this vulnerability by submitting a crafted URL designed to exploit the issue. A successful exploit could allow the attacker to gain unauthenticated access to critical services, resulting in elevated privileges in DNA Center. This vulnerability affects Cisco DNA Center Software Releases prior to 1.1.2. Cisco Bug IDs: CSCvi09394.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Digital Network Architecture Center | <1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0271 is a vulnerability in the API gateway of the Cisco Digital Network Architecture (DNA) Center that allows an unauthenticated, remote attacker to bypass authentication and access critical services.
CVE-2018-0271 is considered a critical vulnerability with a severity rating of 9.8 out of 10.
The affected software version for CVE-2018-0271 is Cisco Digital Network Architecture Center up to exclusive version 1.1.2.
An attacker can exploit CVE-2018-0271 by bypassing authentication and accessing critical services through the API gateway of the Cisco DNA Center.
You can find more information about CVE-2018-0271 in the following references: [SecurityFocus](http://www.securityfocus.com/bid/104191) and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dna2).