First published: Wed Jan 20 2021(Updated: )
A vulnerability in the logging subsystem of Cisco Data Center Network Manager (DCNM) could allow an authenticated, local attacker to view sensitive information in a system log file that should be restricted. The vulnerability exists because sensitive information is not properly masked before it is written to system log files. An attacker could exploit this vulnerability by authenticating to an affected device and inspecting a specific system log file. A successful exploit could allow the attacker to view sensitive information in the system log file. To exploit this vulnerability, the attacker would need to have valid user credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-dcnm-info-disc-QCSJB6YG is rated as moderate severity.
To fix cisco-sa-dcnm-info-disc-QCSJB6YG, apply the patches and software updates provided by Cisco.
cisco-sa-dcnm-info-disc-QCSJB6YG can expose sensitive information stored in the system log files of Cisco Data Center Network Manager.
cisco-sa-dcnm-info-disc-QCSJB6YG affects authenticated local users of the Cisco Data Center Network Manager.
No, cisco-sa-dcnm-info-disc-QCSJB6YG requires local authentication to exploit the vulnerability.