First published: Wed Jun 26 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to gain access to sensitive files on an affected device. The vulnerability is due to incorrect permissions settings on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download arbitrary files from the underlying filesystem of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-file-dwnld
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190626-dcnm-file-dwnld is classified as high due to the potential for unauthorized access to sensitive files.
To mitigate cisco-sa-20190626-dcnm-file-dwnld, it's recommended to apply the latest security patches provided by Cisco for the Data Center Network Manager.
The cisco-sa-20190626-dcnm-file-dwnld vulnerability affects users of Cisco Data Center Network Manager that are running vulnerable versions.
Yes, cisco-sa-20190626-dcnm-file-dwnld can be exploited by an unauthenticated remote attacker.
The potential impacts of cisco-sa-20190626-dcnm-file-dwnld include unauthorized access to sensitive files and potential data breaches.