Lucene search

K
ciscoCiscoCISCO-SA-20180815-DNA-INJECTION
HistoryAug 15, 2018 - 4:00 p.m.

Cisco Digital Network Architecture Center Command Injection Vulnerability

2018-08-1516:00:00
tools.cisco.com
26

EPSS

0.001

Percentile

48.2%

A vulnerability in the CronJob scheduler API of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to perform a command injection attack.

The vulnerability is due to incorrect input validation of user-supplied data. An attacker could exploit this vulnerability by sending a malicious packet. A successful exploit could allow the attacker to execute arbitrary commands with root privileges.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-dna-injection [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-dna-injection”]

Affected configurations

Vulners
Node
ciscocisco_digital_network_architecture_center_\(dna_center\)Matchany
OR
ciscocisco_digital_network_architecture_center_\(dna_center\)Matchany
VendorProductVersionCPE
ciscocisco_digital_network_architecture_center_\(dna_center\)anycpe:2.3:a:cisco:cisco_digital_network_architecture_center_\(dna_center\):any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

48.2%

Related for CISCO-SA-20180815-DNA-INJECTION