First published: Wed Nov 18 2020(Updated: )
A vulnerability in the user management functionality of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to manage user information for users in different domains on an affected system. The vulnerability is due to improper domain access control. An attacker could exploit this vulnerability by manipulating JSON payloads to target different domains on an affected system. A successful exploit could allow the attacker to manage user information for users in different domains on an affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IoT Field Network Director | <4.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26080 has a high severity rating due to the potential for unauthorized user management across different domains.
To fix CVE-2020-26080, update Cisco IoT Field Network Director to version 4.6.1 or later.
CVE-2020-26080 affects users of Cisco IoT Field Network Director versions prior to 4.6.1.
CVE-2020-26080 allows an authenticated, remote attacker to manage user information across different domains.
Yes, authentication is required to exploit CVE-2020-26080.