First published: Tue Aug 28 2018(Updated: )
A vulnerability in Cisco Data Center Network Manager software could allow an authenticated, remote attacker to conduct directory traversal attacks and gain access to sensitive files on the targeted system. The vulnerability is due to improper validation of user requests within the management interface. An attacker could exploit this vulnerability by sending malicious requests containing directory traversal character sequences within the management interface. An exploit could allow the attacker to view or create arbitrary files on the targeted system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180828-dcnm-traversal
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180828-dcnm-traversal is considered critical due to the potential for unauthorized access to sensitive files.
To address cisco-sa-20180828-dcnm-traversal, apply the available patches provided by Cisco for the affected Data Center Network Manager software.
The vulnerability impacts users of Cisco Data Center Network Manager versions that do not have the necessary security updates applied.
No, an authenticated user is required to exploit the cisco-sa-20180828-dcnm-traversal vulnerability.
cisco-sa-20180828-dcnm-traversal facilitates directory traversal attacks, allowing access to sensitive files on the server.