First published: Thu Jun 27 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to gain access to sensitive files on an affected device. The vulnerability is due to incorrect permissions settings on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download arbitrary files from the underlying filesystem of the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) | =11.0\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1621 has a high severity rating due to its potential for unauthorized access to sensitive files.
To fix CVE-2019-1621, update Cisco Data Center Network Manager to version 11.1 or later, which addresses the permission settings.
CVE-2019-1621 affects Cisco Data Center Network Manager version 11.0(1).
Yes, CVE-2019-1621 can be exploited remotely by an unauthenticated attacker.
CVE-2019-1621 allows access to sensitive files on the affected Cisco Data Center Network Manager device.