First published: Wed Jul 29 2020(Updated: )
A vulnerability in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with a low-privileged account to bypass authorization on the API of an affected device. The vulnerability is due to insufficient authorization of certain API functions. An attacker could exploit this vulnerability by sending a crafted request to the API using low-privileged credentials. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-improper-auth-7Krd9TDT
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-dcnm-improper-auth-7Krd9TDT is considered medium due to the potential for unauthorized access through the REST API.
To mitigate cisco-sa-dcnm-improper-auth-7Krd9TDT, ensure that you have the latest patches installed for Cisco Data Center Network Manager.
The cisco-sa-dcnm-improper-auth-7Krd9TDT vulnerability affects users of Cisco Data Center Network Manager with API access.
Yes, cisco-sa-dcnm-improper-auth-7Krd9TDT can be exploited by an authenticated remote attacker with a low-privileged account.
The cisco-sa-dcnm-improper-auth-7Krd9TDT vulnerability is caused by insufficient authorization on certain API endpoints.