First published: Wed Jul 29 2020(Updated: )
A vulnerability in the archive utility of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to a lack of proper input validation of paths that are embedded within archive files. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to write arbitrary files in the system with the privileges of the logged-in user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-path-trav-2xZOnJdR
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-dcnm-path-trav-2xZOnJdR is critical due to the potential for unauthorized access to sensitive files.
To fix cisco-sa-dcnm-path-trav-2xZOnJdR, you should update your Cisco Data Center Network Manager to the latest version provided by Cisco.
Organizations using Cisco Data Center Network Manager software are affected by cisco-sa-dcnm-path-trav-2xZOnJdR.
The cisco-sa-dcnm-path-trav-2xZOnJdR vulnerability enables authenticated remote attackers to conduct directory traversal attacks.
Symptoms of exploitation of cisco-sa-dcnm-path-trav-2xZOnJdR may include unauthorized access to files and system anomalies.