First published: Wed Jul 29 2020(Updated: )
A vulnerability in the Device Manager application of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions on an affected device. The vulnerability is due to a failure in the software to perform proper authentication. An attacker could exploit this vulnerability by browsing to one of the hosted URLs in Cisco DCNM. A successful exploit could allow the attacker to interact with and use certain functions within the Cisco DCNM. Cisco has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-auth-bypass-JkubGpu3
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-dcnm-auth-bypass-JkubGpu3 vulnerability is classified as high severity due to its potential for allowing unauthenticated remote access.
To fix the cisco-sa-dcnm-auth-bypass-JkubGpu3 vulnerability, apply the latest security patches or updates provided by Cisco for the Data Center Network Manager.
Cisco Data Center Network Manager (DCNM) versions are affected by the cisco-sa-dcnm-auth-bypass-JkubGpu3 vulnerability.
Yes, the cisco-sa-dcnm-auth-bypass-JkubGpu3 vulnerability can be exploited remotely by unauthenticated attackers.
If cisco-sa-dcnm-auth-bypass-JkubGpu3 is exploited, an attacker can execute arbitrary actions on the affected device.