First published: Wed Nov 18 2020(Updated: )
A vulnerability in the access control functionality of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to view lists of users from different domains that are configured on an affected system. The vulnerability is due to improper access control. An attacker could exploit this vulnerability by sending an API request that alters the domain for a requested user list on an affected system. A successful exploit could allow the attacker to view lists of users from different domains on the affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IoT Field Network Director | <4.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26077 is a vulnerability in the access control functionality of Cisco IoT Field Network Director (FND) that could allow an authenticated, remote attacker to view lists of users from different domains on an affected system.
CVE-2020-26077 has a severity rating of 4.3, which is considered medium.
Cisco IoT Field Network Director (FND) versions up to and excluding 4.6.1 are affected by CVE-2020-26077.
CVE-2020-26077 is associated with CWE-269 and CWE-284.
You can find more information about CVE-2020-26077 on the Cisco Security Advisory page: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-FND-LV-hE4Rntet