First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p
Credit: These vulnerabilities were found during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-dcnm-api-path-TpTApx2p is high due to the potential for authenticated remote attack leading to data manipulation.
To fix cisco-sa-dcnm-api-path-TpTApx2p, update to the latest version of Cisco Data Center Network Manager as recommended by Cisco.
Cisco Data Center Network Manager (DCNM) users are affected by cisco-sa-dcnm-api-path-TpTApx2p if they are running vulnerable versions.
cisco-sa-dcnm-api-path-TpTApx2p facilitates attacks that allow an authenticated user to view, modify, and delete data without proper authorization.
Yes, exploitation of cisco-sa-dcnm-api-path-TpTApx2p requires authentication as it involves an authenticated attack vector.