First published: Wed Aug 05 2020(Updated: )
A vulnerability in Cisco DNA Center software could allow an unauthenticated remote attacker access to sensitive information on an affected system. The vulnerability is due to improper handling of authentication tokens by the affected software. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker access to sensitive device information, which includes configuration files. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dna-info-disc-3bz8BCgR
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco-SA-DNA-INFO-DISC-3BZ8BCgR is rated as high due to the potential for unauthenticated remote access to sensitive information.
To fix Cisco-SA-DNA-INFO-DISC-3BZ8BCgR, it is recommended to apply the latest security patches provided by Cisco for DNA Center software.
Organizations using affected versions of Cisco DNA Center software are at risk from the Cisco-SA-DNA-INFO-DISC-3BZ8BCgR vulnerability.
An attacker could access sensitive information on systems running vulnerable versions of Cisco DNA Center software by exploiting Cisco-SA-DNA-INFO-DISC-3BZ8BCgR.
No, an attacker does not need authentication to exploit Cisco-SA-DNA-INFO-DISC-3BZ8BCgR, making it particularly dangerous.