Lucene search

K
ciscoCiscoCISCO-SA-CCC-AUTHZ-BYPASS-5EKCHJRB
HistoryMar 27, 2024 - 4:00 p.m.

Cisco Catalyst Center Authorization Bypass Vulnerability

2024-03-2716:00:00
tools.cisco.com
5
cisco
catalyst center
authorization bypass
vulnerability
web-based interface
software updates
remote attacker
http request
insufficient authorization.

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

A vulnerability in the web-based management interface of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to change specific data within the interface on an affected device.

This vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to change a specific field within the web-based management interface, even though they should not have access to change that field.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccc-authz-bypass-5EKchJRb”]

Affected configurations

Vulners
Node
ciscodigital_network_architecture_centerMatchany
OR
ciscodigital_network_architecture_centerMatchany

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for CISCO-SA-CCC-AUTHZ-BYPASS-5EKCHJRB