First published: Fri Jul 31 2020(Updated: )
A vulnerability in specific REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system with the privileges of the logged-in user. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to inject arbitrary commands on the underlying operating system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <11.4\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3384 is a vulnerability in specific REST API endpoints of Cisco Data Center Network Manager (DCNM) that could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system with the privileges of the logged-in user.
CVE-2020-3384 impacts Cisco Data Center Network Manager by allowing an attacker to inject arbitrary commands and potentially gain unauthorized access with the privileges of the logged-in user.
CVE-2020-3384 has a severity rating of 8.2 (high).
To fix CVE-2020-3384, it is recommended to upgrade to a version of Cisco Data Center Network Manager that is not affected by the vulnerability.
You can find more information about CVE-2020-3384 on the Cisco Security Advisory page.