First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <11.4\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Cisco Data Center Network Manager (DCNM) is a network management application that provides visibility, automation, and control for data center networks.
CVE-2021-1133 is a vulnerability in the REST API endpoint of Cisco Data Center Network Manager (DCNM) that could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization.
CVE-2021-1133 has a severity score of 7.3, which is considered high.
An authenticated, remote attacker can exploit CVE-2021-1133 by sending specially crafted requests to the REST API endpoint of Cisco DCNM.
Yes, Cisco has released a software update to address CVE-2021-1133. It is recommended to update to the latest version of Cisco Data Center Network Manager (DCNM) to mitigate this vulnerability.