CWE
78
Advisory Published
Updated

CVE-2019-15978: Cisco Data Center Network Manager Command Injection Vulnerabilities

First published: Mon Jan 06 2020(Updated: )

Multiple vulnerabilities in the REST and SOAP API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with administrative privileges on the DCNM application to inject arbitrary commands on the underlying operating system (OS). For more information about these vulnerabilities, see the Details section of this advisory. Note: The severity of these vulnerabilities is aggravated by the vulnerabilities described in the Cisco Data Center Network Manager Authentication Bypass Vulnerabilities advisory, published simultaneously with this one.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Data Center Network Manager<11.3\(1\)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-15978?

    CVE-2019-15978 is a vulnerability in the REST and SOAP API endpoints of Cisco Data Center Network Manager (DCNM) that allows an authenticated attacker to inject arbitrary commands on the underlying operating system.

  • How severe is CVE-2019-15978?

    CVE-2019-15978 has a severity rating of 7.2 (critical).

  • How does CVE-2019-15978 affect Cisco Data Center Network Manager?

    CVE-2019-15978 affects Cisco Data Center Network Manager versions up to and including 11.3(1).

  • How can an attacker exploit CVE-2019-15978?

    An attacker with administrative privileges on the DCNM application can exploit CVE-2019-15978 by using the REST or SOAP API endpoints to inject arbitrary commands on the underlying OS.

  • Are there any references for CVE-2019-15978?

    Yes, you can find more information about CVE-2019-15978 at the following links: [Packet Storm Security](http://packetstormsecurity.com/files/156242/Cisco-Data-Center-Network-Manager-11.2.1-Command-Injection.html) and [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-comm-inject).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203