First published: Fri Jul 31 2020(Updated: )
A vulnerability in the Device Manager application of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions on an affected device. The vulnerability is due to a failure in the software to perform proper authentication. An attacker could exploit this vulnerability by browsing to one of the hosted URLs in Cisco DCNM. A successful exploit could allow the attacker to interact with and use certain functions within the Cisco DCNM.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | =11.0\(1\) | |
Cisco Data Center Network Manager | =11.1\(1\) | |
Cisco Data Center Network Manager | =11.2\(1\) | |
Cisco Data Center Network Manager | =11.3\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3376 is a vulnerability in the Device Manager application of Cisco Data Center Network Manager (DCNM) that allows an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions on an affected device.
CVE-2020-3376 has a severity score of 9.8, which is considered critical.
Cisco Data Center Network Manager versions 11.0(1), 11.1(1), 11.2(1), and 11.3(1) are affected by CVE-2020-3376.
To fix CVE-2020-3376, it is recommended to upgrade to a patched version of Cisco Data Center Network Manager. Refer to the Cisco Security Advisory for specific details.
You can find more information about CVE-2020-3376 in the Cisco Security Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-auth-bypass-JkubGpu3