First published: Fri Jul 31 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <11.4\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3462 is a vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) that can allow an authenticated, remote attacker to conduct SQL injection attacks.
CVE-2020-3462 occurs due to improper validation of user-submitted parameters in the web-based management interface of Cisco Data Center Network Manager (DCNM).
The severity of CVE-2020-3462 is medium with a CVSS score of 6.3.
An attacker can exploit CVE-2020-3462 by conducting SQL injection attacks on an affected system through the web-based management interface of Cisco Data Center Network Manager (DCNM).
Yes, Cisco has released a security advisory with remediation steps to address CVE-2020-3462. You can find more information at the following link: [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inject-8hk6PwmF)