First published: Fri Oct 05 2018(Updated: )
A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and have direct unauthorized access to critical management functions. The vulnerability is due to an insecure default configuration of the affected system. An attacker could exploit this vulnerability by directly connecting to the exposed services. An exploit could allow the attacker to retrieve and modify critical system files.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center | =1.1 | |
Cisco DNA Center | =1.1.1 | |
Cisco DNA Center | =1.1.2 | |
Cisco DNA Center | =1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15386 has been classified as critical due to the potential for unauthorized access to management functions.
To fix CVE-2018-15386, users should update to the latest version of Cisco Digital Network Architecture Center as recommended by Cisco.
CVE-2018-15386 affects users of Cisco Digital Network Architecture Center versions 1.1, 1.1.1, 1.1.2, and 1.1.3.
An attacker exploiting CVE-2018-15386 can bypass authentication and gain direct unauthorized access to critical management functions.
No, authentication is not required to exploit CVE-2018-15386, making it especially dangerous.