First published: Wed Aug 19 2020(Updated: )
A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-patrav-pW9RkhyW
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level of cisco-sa-dcnm-patrav-pW9RkhyW is classified as high.
To fix cisco-sa-dcnm-patrav-pW9RkhyW, apply the latest patches provided by Cisco for the affected versions of Data Center Network Manager.
cisco-sa-dcnm-patrav-pW9RkhyW is caused by insufficient validation of user-supplied input in a specific REST API method.
Organizations using Cisco Data Center Network Manager software are affected by the cisco-sa-dcnm-patrav-pW9RkhyW vulnerability.
The cisco-sa-dcnm-patrav-pW9RkhyW vulnerability allows an attacker to perform a path traversal attack.