First published: Wed Feb 02 2022(Updated: )
A vulnerability in the audit log of Cisco DNA Center could allow an authenticated, local attacker to view sensitive information in clear text. This vulnerability is due to the unsecured logging of sensitive information on an affected system. An attacker with administrative privileges could exploit this vulnerability by accessing the audit logs through the CLI. A successful exploit could allow the attacker to retrieve sensitive information that includes user credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-info-disc-8QEynKEj
Credit: David Yarashus NetCraftsmen
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center | >=2.1.2=2.2.2=2.2.3<=2.3.2<2.3.2.01 | 2.3.2.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
It is a vulnerability in the audit log of Cisco DNA Center that allows an authenticated, local attacker to view sensitive information in clear text.
An attacker with administrative privileges could exploit this vulnerability by accessing the unsecured logging of sensitive information on an affected system.
The severity of this vulnerability is medium with a CVSS score of 4.4.
Versions 2.1.2, 2.2.2, 2.2.3, up to 2.3.2 (exclusive), and up to 2.3.2.01 (inclusive) are affected by this vulnerability.
To fix this vulnerability, upgrade to Cisco DNA Center version 2.3.2.01 or later.