First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3
Credit: These vulnerabilities were found during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-XXXX can lead to an attacker spoofing a trusted host or executing a man-in-the-middle attack, potentially exposing sensitive information.
To address cisco-sa-dcnm-cert-check-BdZZV9T3, ensure all certificates are validated properly and apply any patches or updates provided by Cisco.
Cisco Data Center Network Manager versions prior to the security advisories are affected by cisco-sa-dcnm-cert-check-BdZZV9T3.
Currently, there are no specific workarounds for the vulnerabilities detailed in cisco-sa-dcnm-cert-check-BdZZV9T3 aside from applying the recommended updates.
The vulnerability can facilitate spoofing attacks and man-in-the-middle attacks, which may compromise sensitive data.