CWE
78 20 77
Advisory Published

cisco-sa-dnac-cmdinj-erumsWh9: Cisco DNA Center Command Runner Command Injection Vulnerability

First published: Wed Jan 20 2021(Updated: )

A vulnerability in the Command Runner tool of Cisco DNA Center could allow an authenticated, remote attacker to perform a command injection attack. The vulnerability is due to insufficient input validation by the Command Runner tool. An attacker could exploit this vulnerability by providing crafted input during command execution or via a crafted command runner API call. A successful exploit could allow the attacker to execute arbitrary CLI commands on devices managed by Cisco DNA Center. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-cmdinj-erumsWh9

Affected SoftwareAffected VersionHow to fix
Cisco DNA Center Software

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of cisco-sa-dnac-cmdinj-erumsWh9?

    The severity of cisco-sa-dnac-cmdinj-erumsWh9 is considered high due to the potential for command injection by an authenticated attacker.

  • How do I fix cisco-sa-dnac-cmdinj-erumsWh9?

    To fix cisco-sa-dnac-cmdinj-erumsWh9, ensure that all software is updated to the latest version provided by Cisco that addresses this vulnerability.

  • Who is affected by cisco-sa-dnac-cmdinj-erumsWh9?

    Organizations using Cisco DNA Center are affected by the cisco-sa-dnac-cmdinj-erumsWh9 vulnerability.

  • What type of attack can be performed using cisco-sa-dnac-cmdinj-erumsWh9?

    An attacker can perform a command injection attack through the Command Runner tool due to insufficient input validation.

  • Is authentication required to exploit cisco-sa-dnac-cmdinj-erumsWh9?

    Yes, authentication is required to exploit the cisco-sa-dnac-cmdinj-erumsWh9 vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203