First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <11.5\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Data Center Network Manager (DCNM) vulnerability is CVE-2021-1276.
The severity of CVE-2021-1276 is high with a CVSS score of 6.5.
The affected software for CVE-2021-1276 is Cisco Data Center Network Manager (DCNM) version up to 11.5(1).
An attacker can exploit CVE-2021-1276 by spoofing a trusted host or conducting a man-in-the-middle attack to extract sensitive information or alter certain API requests.
Yes, Cisco has released a security advisory with the necessary updates to address the vulnerabilities. Please refer to the provided reference for more information.