First published: Fri Jul 31 2020(Updated: )
A vulnerability in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with a low-privileged account to bypass authorization on the API of an affected device. The vulnerability is due to insufficient authorization of certain API functions. An attacker could exploit this vulnerability by sending a crafted request to the API using low-privileged credentials. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <11.4\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Cisco Data Center Network Manager vulnerability is CVE-2020-3386.
CVE-2020-3386 has a severity level of critical.
CVE-2020-3386 allows an authenticated, remote attacker with a low-privileged account to bypass authorization on the API of an affected device in Cisco Data Center Network Manager.
The affected software version of Cisco Data Center Network Manager is up to but excluding version 11.4(1).
You can find more information about CVE-2020-3386 in the Cisco Security Advisory at this link: [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-improper-auth-7Krd9TDT)