First published: Fri Jul 31 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. The vulnerability is due to missing authentication on a specific part of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface. A successful exploit could allow the attacker to read confidential information from an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <11.4\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3461 is a vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) that could allow an unauthenticated, remote attacker to obtain confidential information from an affected device.
CVE-2020-3461 has a severity level of medium, with a severity value of 5.3.
The vulnerability affects Cisco Data Center Network Manager (DCNM) version 11.4(1).
An attacker can exploit CVE-2020-3461 by exploiting the missing authentication on a specific part of the web-based management interface of Cisco Data Center Network Manager (DCNM).
Yes, Cisco has released a security advisory addressing the vulnerability, which can be found at the following URL: [link](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disclosure-tFX3KerC)