First published: Wed Jun 19 2019(Updated: )
A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, adjacent attacker to bypass authentication and access critical internal services. The vulnerability is due to insufficient access restriction to ports necessary for system operation. An attacker could exploit this vulnerability by connecting an unauthorized network device to the subnet designated for cluster services. A successful exploit could allow an attacker to reach internal services that are not hardened for external access. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-dnac-bypass
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190619-dnac-bypass is rated as high due to potential unauthorized access to critical internal services.
To fix cisco-sa-20190619-dnac-bypass, ensure that all access restrictions are properly implemented on the affected ports.
Organizations using Cisco DNA Center software are affected by the cisco-sa-20190619-dnac-bypass vulnerability.
An unauthenticated, adjacent attacker could exploit cisco-sa-20190619-dnac-bypass to bypass authentication and gain unauthorized access.
You can determine if you are vulnerable to cisco-sa-20190619-dnac-bypass by assessing your configuration and access control settings on the affected Cisco DNA Center.