First published: Wed Nov 18 2020(Updated: )
A vulnerability in the REST API of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to gain access to the back-end database of an affected device. The vulnerability is due to insufficient input validation of REST API requests that are made to an affected device. An attacker could exploit this vulnerability by crafting malicious API requests to the affected device. A successful exploit could allow the attacker to gain access to the back-end database of the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IoT Field Network Director | <4.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26075 is rated as a high severity vulnerability due to its potential to expose sensitive data.
To fix CVE-2020-26075, upgrade Cisco IoT Field Network Director to version 4.6.1 or later.
CVE-2020-26075 affects users of Cisco IoT Field Network Director versions prior to 4.6.1.
CVE-2020-26075 can be exploited by an authenticated, remote attacker to gain unauthorized access to the back-end database.
CVE-2020-26075 is caused by insufficient input validation in the REST API requests of Cisco IoT Field Network Director.