First published: Thu Jan 02 2020(Updated: )
Multiple vulnerabilities in the REST and SOAP API endpoints and the Application Framework feature of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. To exploit these vulnerabilities, an attacker would need administrative privileges on the DCNM application. For more information about these vulnerabilities, see the Details section of this advisory. Note: The severity of these vulnerabilities is aggravated by the vulnerabilities described in the Cisco Data Center Network Manager Authentication Bypass Vulnerabilities advisory, published simultaneously with this one. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav
Credit: Steven Seeley (mr_me) Source Incite Trend MicroiDefense Accenture for reporting these vulnerabilities.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-20200102-dcnm-path-trav is considered high due to the potential for directory traversal attacks.
To fix cisco-sa-20200102-dcnm-path-trav, apply the recommended software patches provided by Cisco for the affected versions of DCNM.
Cisco Data Center Network Manager (DCNM) is affected by cisco-sa-20200102-dcnm-path-trav, impacting its REST and SOAP API endpoints.
Yes, cisco-sa-20200102-dcnm-path-trav can be exploited by an authenticated, remote attacker.
The potential impacts of cisco-sa-20200102-dcnm-path-trav include unauthorized access to sensitive files and data on the device.