First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Data Center Network Manager | <11.5\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1277 is a vulnerability in Cisco Data Center Network Manager (DCNM) that could allow an attacker to spoof a trusted host or perform a man-in-the-middle attack.
The severity of CVE-2021-1277 is high with a severity value of 6.5.
CVE-2021-1277 could allow an attacker to extract sensitive information or alter certain API requests in Cisco Data Center Network Manager.
An attacker can exploit CVE-2021-1277 by performing spoofing or man-in-the-middle attacks to gain unauthorized access or manipulate data.
Yes, Cisco has provided a fix for CVE-2021-1277. It is recommended to update to the latest version of Cisco Data Center Network Manager.