First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in certain REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to execute arbitrary SQL commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP
Credit: These vulnerabilities were found during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-dcnm-sql-inj-OAQOObP is classified as high due to the potential for remote SQL injection attacks.
To fix cisco-sa-dcnm-sql-inj-OAQOObP, apply the latest security patches provided by Cisco for the affected version of Data Center Network Manager.
Cisco Data Center Network Manager users with specific REST API endpoints are affected by cisco-sa-dcnm-sql-inj-OAQOObP vulnerabilities.
Yes, cisco-sa-dcnm-sql-inj-OAQOObP can be exploited remotely by authenticated attackers to execute arbitrary SQL commands.
If using Cisco Data Center Network Manager, assess your environment for vulnerability exposure and implement security updates immediately.