A vulnerability in the Software Image Management feature of Cisco DNA Center could allow an authenticated, remote attacker to access to internal services without additional authentication.
The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending arbitrary HTTP requests to internal services. An exploit could allow the attacker to bypass any firewall or other protections to access unauthorized internal services.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-swim-proxy [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-swim-proxy”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | cisco_digital_network_architecture_center_\(dna_center\) | any | cpe:2.3:a:cisco:cisco_digital_network_architecture_center_\(dna_center\):any:*:*:*:*:*:*:* |