First published: Wed Sep 27 2023(Updated: )
A vulnerability in Cisco DNA Center could allow an unauthenticated, remote attacker to read and modify data in a repository that belongs to an internal service on an affected device.This vulnerability is due to insufficient access control enforcement on API requests. An attacker could
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-dnac-ins-acc-con-nHAVDRBZ is classified as high due to potential unauthorized access to sensitive data.
To fix cisco-sa-dnac-ins-acc-con-nHAVDRBZ, it is recommended to apply the latest software update provided by Cisco for the affected Cisco DNA Center.
Users and administrators of Cisco DNA Center are affected by the cisco-sa-dnac-ins-acc-con-nHAVDRBZ vulnerability.
cisco-sa-dnac-ins-acc-con-nHAVDRBZ is an access control vulnerability that allows unauthorized actions via improperly enforced API requests.
Yes, cisco-sa-dnac-ins-acc-con-nHAVDRBZ can be exploited by an unauthenticated, remote attacker.