First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow a remote attacker with network-operator privileges to conduct a cross-site scripting (XSS) attack or a reflected file download (RFD) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh
Credit: These vulnerabilities were found during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-dcnm-xss-vulns-GuUJ39gh is categorized as high due to the risk of cross-site scripting and reflected file download attacks.
To fix cisco-sa-dcnm-xss-vulns-GuUJ39gh, update your Cisco Data Center Network Manager to the latest version released by Cisco.
cisco-sa-dcnm-xss-vulns-GuUJ39gh is associated with cross-site scripting (XSS) and reflected file download (RFD) attacks.
Users with network-operator privileges in Cisco Data Center Network Manager are affected by cisco-sa-dcnm-xss-vulns-GuUJ39gh.
The impact of cisco-sa-dcnm-xss-vulns-GuUJ39gh includes potential unauthorized actions being taken by attackers through XSS vulnerabilities.