First published: Fri Jul 31 2020(Updated: )
A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability exists because different installations share a static encryption key. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <11.4\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3382 is a vulnerability in the REST API of Cisco Data Center Network Manager (DCNM) that could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device.
The severity of CVE-2020-3382 is critical with a CVSS score of 9.8.
An attacker can exploit CVE-2020-3382 by sending malicious requests to the vulnerable REST API of Cisco Data Center Network Manager, allowing them to bypass authentication and gain administrative privileges.
Yes, Cisco has released a security advisory with remediation steps to address CVE-2020-3382. It is recommended to apply the necessary patches or upgrades provided by the vendor.
You can find more information about CVE-2020-3382 in the Cisco Security Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-dyEejUMs.