First published: Thu Jan 02 2020(Updated: )
Multiple vulnerabilities in the REST and SOAP API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with administrative privileges on the DCNM application to inject arbitrary commands on the underlying operating system (OS). For more information about these vulnerabilities, see the Details section of this advisory. Note: The severity of these vulnerabilities is aggravated by the vulnerabilities described in the Cisco Data Center Network Manager Authentication Bypass Vulnerabilities advisory, published simultaneously with this one. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-comm-inject
Credit: Steven Seeley (mr_me) Source Incite Trend MicroiDefense Accenture for reporting these vulnerabilities.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20200102-dcnm-comm-inject is high due to potential command injection vulnerabilities.
To fix cisco-sa-20200102-dcnm-comm-inject, update Cisco Data Center Network Manager to the latest patched version provided by Cisco.
Cisco Data Center Network Manager (DCNM) is the affected system identified in cisco-sa-20200102-dcnm-comm-inject.
An authenticated, remote attacker with administrative privileges can exploit cisco-sa-20200102-dcnm-comm-inject.
Using cisco-sa-20200102-dcnm-comm-inject, attackers can inject arbitrary commands on the underlying operating system.