First published: Wed Aug 19 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to bypass authorization on an affected device and access sensitive information that is related to the device. The vulnerability exists because the affected software allows users to access resources that are intended for administrators only. An attacker could exploit this vulnerability by submitting a crafted URL to an affected device. A successful exploit could allow the attacker to add, delete, and edit certain network configurations in the same manner as a user with administrative privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-auth-bypass-MYeFpFcF
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-dcnm-auth-bypass-MYeFpFcF is considered high due to its potential to allow unauthorized access to sensitive information.
To fix cisco-sa-dcnm-auth-bypass-MYeFpFcF, upgrade to the latest version of Cisco Data Center Network Manager that addresses this vulnerability.
Organizations using vulnerable versions of Cisco Data Center Network Manager software are impacted by cisco-sa-dcnm-auth-bypass-MYeFpFcF.
Exploitations of cisco-sa-dcnm-auth-bypass-MYeFpFcF can lead to unauthorized access to sensitive device information by authenticated remote attackers.
Affected software versions are those of Cisco Data Center Network Manager prior to the security updates addressing cisco-sa-dcnm-auth-bypass-MYeFpFcF.