First published: Wed Nov 20 2019(Updated: )
A vulnerability in Cisco DNA Spaces: Connector could allow an authenticated, local attacker to perform a command injection attack and execute arbitrary commands on the underlying operating system as root. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command. An attacker could exploit this vulnerability by including malicious input during the execution of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as root. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191120-dna-cmd-injection
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Spaces |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20191120-dna-cmd-injection is critical due to the potential for command injection attacks.
To fix cisco-sa-20191120-dna-cmd-injection, apply the latest patches provided by Cisco for the DNA Spaces: Connector.
The cisco-sa-20191120-dna-cmd-injection vulnerability affects users of Cisco DNA Spaces: Connector.
cisco-sa-20191120-dna-cmd-injection can allow an authenticated attacker to execute arbitrary commands on the operating system as root.
Yes, authentication is required to exploit the cisco-sa-20191120-dna-cmd-injection vulnerability.