First published: Wed Aug 26 2020(Updated: )
A vulnerability in a specific REST API of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with a low-privileged account could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to read arbitrary files on the affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <11.4\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3521 is a vulnerability in Cisco Data Center Network Manager (DCNM) Software that allows an authenticated, remote attacker to conduct directory traversal attacks.
CVE-2020-3521 affects Cisco Data Center Network Manager (DCNM) Software versions up to 11.4(1).
The severity of CVE-2020-3521 is medium with a CVSS score of 6.5.
An attacker can exploit CVE-2020-3521 by exploiting a specific REST API in Cisco Data Center Network Manager (DCNM) Software to conduct directory traversal attacks.
Yes, Cisco has released a security advisory with guidance on how to mitigate this vulnerability.