First published: Thu Jun 18 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need administrative credentials on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <=11.3\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3355 is a vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) that allows an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack.
The severity of CVE-2020-3355 is medium with a severity value of 4.8.
CVE-2020-3355 affects Cisco Data Center Network Manager by enabling an authenticated, remote attacker to perform a cross-site scripting (XSS) attack against a user of the interface.
An attacker with administrative credentials can exploit CVE-2020-3355 by leveraging the web-based management interface of Cisco Data Center Network Manager to conduct a cross-site scripting (XSS) attack.
Yes, Cisco has released a security advisory (Cisco-SA-DCNM-Stored-XSS) that provides remediation steps to mitigate the vulnerability. Refer to the advisory for more details.