First published: Wed Jan 20 2021(Updated: )
A vulnerability in the user management roles of Cisco DNA Center could allow an authenticated, remote attacker to execute unauthorized commands on an affected device. The vulnerability is due to improper enforcement of actions for assigned user roles. An attacker could exploit this vulnerability by authenticating as a user with an Observer role and executing commands on the affected device. A successful exploit could allow a user with the Observer role to execute commands to view diagnostic information of the devices that Cisco DNA Center manages. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-privesc-6qjA3hVh
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-dnac-privesc-6qjA3hVh is classified as high due to potential unauthorized command execution.
To fix cisco-sa-dnac-privesc-6qjA3hVh, ensure you apply the latest security updates provided by Cisco for DNA Center.
The affected product for cisco-sa-dnac-privesc-6qjA3hVh is Cisco DNA Center Software.
Authenicated remote attackers can exploit cisco-sa-dnac-privesc-6qjA3hVh due to improper enforcement of user role actions.
The potential consequences of cisco-sa-dnac-privesc-6qjA3hVh include unauthorized command execution which can lead to security breaches.