First published: Wed Jan 20 2021(Updated: )
A vulnerability in the configuration archive functionality of Cisco DNA Center could allow any privilege-level authenticated, remote attacker to obtain the full unmasked running configuration of managed devices. The vulnerability is due to the configuration archives files being stored in clear text, which can be retrieved by various API calls. An attacker could exploit this vulnerability by authenticating to the device and executing a series of API calls. A successful exploit could allow the attacker to retrieve the full unmasked running configurations of managed devices. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnacid-OfeeRjcn
Credit: This vulnerability was found by Prabudas Varadarajan Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco DNA Center Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-dnacid-OfeeRjcn is classified as high due to the potential exposure of sensitive configuration data.
To fix cisco-sa-dnacid-OfeeRjcn, it is recommended to apply the latest patches provided by Cisco for the DNA Center software.
Cisco DNA Center users with authenticated access are affected by cisco-sa-dnacid-OfeeRjcn.
cisco-sa-dnacid-OfeeRjcn facilitates an information disclosure attack that can expose running configurations.
Currently, there are no documented workarounds for cisco-sa-dnacid-OfeeRjcn other than applying the recommended updates.