Lucene search

K
ciscoCiscoCISCO-SA-20180516-DNA2
HistoryMay 16, 2018 - 4:00 p.m.

Cisco Digital Network Architecture Center Authentication Bypass Vulnerability

2018-05-1616:00:00
tools.cisco.com
31

EPSS

0.004

Percentile

73.1%

A vulnerability in the API gateway of the Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and access critical services.

The vulnerability is due to a failure to normalize URLs prior to servicing requests. An attacker could exploit this vulnerability by submitting a crafted URL designed to exploit the issue. A successful exploit could allow the attacker to gain unauthenticated access to critical services, resulting in elevated privileges in DNA Center.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dna2 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dna2”]

Affected configurations

Vulners
Node
ciscocisco_digital_network_architecture_center_\(dna_center\)Matchany
OR
ciscocisco_digital_network_architecture_center_\(dna_center\)Matchany
VendorProductVersionCPE
ciscocisco_digital_network_architecture_center_\(dna_center\)anycpe:2.3:a:cisco:cisco_digital_network_architecture_center_\(dna_center\):any:*:*:*:*:*:*:*

EPSS

0.004

Percentile

73.1%

Related for CISCO-SA-20180516-DNA2