First published: Mon Nov 18 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. The vulnerability is due to a failure to limit access to resources that are intended for users with Administrator privileges. An attacker could exploit this vulnerability by convincing a user to click a malicious URL. A successful exploit could allow a low-privileged attacker to list, view, create, edit, and delete templates in the same manner as a user with Administrator privileges.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-3539 is high due to the potential for unauthorized data access and manipulation.
To fix CVE-2020-3539, update the Cisco Data Center Network Manager to the latest version that addresses this vulnerability.
CVE-2020-3539 affects authenticated users of Cisco Data Center Network Manager who can exploit the vulnerability.
CVE-2020-3539 allows attackers to view, modify, and delete sensitive data without proper authorization.
Yes, CVE-2020-3539 is remotely exploitable by an authenticated attacker.