First published: Thu Jun 27 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device. The vulnerability is due to improper access controls for certain URLs on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download log files and diagnostic information from the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) | =11.0\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1622 is classified as a high severity vulnerability.
To mitigate CVE-2019-1622, update Cisco Data Center Network Manager to the latest version that addresses this vulnerability.
CVE-2019-1622 allows an unauthenticated, remote attacker to retrieve sensitive information from affected devices.
CVE-2019-1622 specifically affects Cisco Data Center Network Manager version 11.0(1).
The potential consequences of CVE-2019-1622 include unauthorized access to sensitive information, compromising security and privacy.