First published: Wed Apr 17 2019(Updated: )
A vulnerability in the Software Image Management feature of Cisco DNA Center could allow an authenticated, remote attacker to access to internal services without additional authentication. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending arbitrary HTTP requests to internal services. An exploit could allow the attacker to bypass any firewall or other protections to access unauthorized internal services. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-swim-proxy
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190417-swim-proxy is categorized as high due to its potential to allow unauthorized access to internal services.
To fix cisco-sa-20190417-swim-proxy, update your Cisco DNA Center to the latest version provided by Cisco.
The cisco-sa-20190417-swim-proxy vulnerability affects all versions of Cisco DNA Center Software.
The potential impacts of cisco-sa-20190417-swim-proxy include unauthorized access to sensitive internal services.
Yes, authentication is required for an attacker to exploit the cisco-sa-20190417-swim-proxy vulnerability.