Lucene search

K
ciscoCiscoCISCO-SA-DCNM-BYPASS-DYEEJUMS
HistoryJul 29, 2020 - 4:00 p.m.

Cisco Data Center Network Manager Authentication Bypass Vulnerability

2020-07-2916:00:00
tools.cisco.com
26

EPSS

0.008

Percentile

81.4%

A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device.

The vulnerability exists because different installations share a static encryption key. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-dyEejUMs [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-dyEejUMs”]

Affected configurations

Vulners
Node
ciscodata_center_network_managerMatchany
OR
ciscodata_center_network_managerMatchany
VendorProductVersionCPE
ciscodata_center_network_manageranycpe:2.3:a:cisco:data_center_network_manager:any:*:*:*:*:*:*:*

EPSS

0.008

Percentile

81.4%

Related for CISCO-SA-DCNM-BYPASS-DYEEJUMS