First published: Wed Jun 03 2020(Updated: )
A vulnerability in the audit logging component of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text. The vulnerability is due to the storage of certain unencrypted credentials. An attacker could exploit this vulnerability by accessing the audit logs and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Digital Network Architecture Center | <1.3.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3281 is a vulnerability in the audit logging component of Cisco Digital Network Architecture (DNA) Center.
The severity of CVE-2020-3281 is high, with a severity value of 8.8.
An attacker could exploit CVE-2020-3281 by leveraging certain unencrypted credentials to view sensitive information in clear text.
Cisco Digital Network Architecture (DNA) Center versions up to and excluding 1.3.3.3 are affected by CVE-2020-3281.
Yes, Cisco has released a security advisory with instructions on how to mitigate the vulnerability. Please refer to the following link: [link](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-audit-log-59RBdwb6)