First published: Thu Jun 27 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session management on affected DCNM software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to gain administrative access on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | =10.4\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1619 is a vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) that could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device.
CVE-2019-1619 has a severity rating of 9.8, which is considered critical.
The affected software is Cisco Data Center Network Manager version 10.4(2).
An attacker can exploit CVE-2019-1619 by sending specially crafted requests to the web-based management interface of Cisco Data Center Network Manager, allowing them to bypass authentication and execute arbitrary actions.
Yes, here are some references for CVE-2019-1619: [link1](http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html), [link2](http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html), [link3](http://seclists.org/fulldisclosure/2019/Jul/7).