First published: Wed Jul 15 2020(Updated: )
A vulnerability in the CLI of Cisco Data Center Network Manager (DCNM) could allow an authenticated, local attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system. The vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by authenticating as the fmserver user and submitting malicious input to a specific command. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-privescal-zxfCH7Dg
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-dcnm-privescal-zxfCH7Dg has a high severity rating due to potential privilege escalation to root.
To fix cisco-sa-dcnm-privescal-zxfCH7Dg, apply the recommended patches provided by Cisco for the Data Center Network Manager.
Authenticated users of Cisco Data Center Network Manager may be affected by vulnerability cisco-sa-dcnm-privescal-zxfCH7Dg.
The cisco-sa-dcnm-privescal-zxfCH7Dg vulnerability enables authenticated local attackers to execute arbitrary commands with root privileges.
The cisco-sa-dcnm-privescal-zxfCH7Dg vulnerability was disclosed in a Cisco security advisory.