Lucene search

K
cveCiscoCVE-2020-3377
HistoryJul 31, 2020 - 12:15 a.m.

CVE-2020-3377

2020-07-3100:15:13
CWE-78
cisco
web.nvd.nist.gov
58
cisco
dcnm
vulnerability
remote code execution
cve-2020-3377
nvd
security

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0.004

Percentile

74.0%

A vulnerability in the Device Manager application of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to inject arbitrary commands on the affected device. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted arguments to a specific field within the application. A successful exploit could allow the attacker to run commands as the administrator on the DCNM.

Affected configurations

Nvd
Node
ciscodata_center_network_managerMatch11.0\(1\)
OR
ciscodata_center_network_managerMatch11.1\(1\)
OR
ciscodata_center_network_managerMatch11.2\(1\)
OR
ciscodata_center_network_managerMatch11.3\(1\)
VendorProductVersionCPE
ciscodata_center_network_manager11.0(1)cpe:2.3:a:cisco:data_center_network_manager:11.0\(1\):*:*:*:*:*:*:*
ciscodata_center_network_manager11.1(1)cpe:2.3:a:cisco:data_center_network_manager:11.1\(1\):*:*:*:*:*:*:*
ciscodata_center_network_manager11.2(1)cpe:2.3:a:cisco:data_center_network_manager:11.2\(1\):*:*:*:*:*:*:*
ciscodata_center_network_manager11.3(1)cpe:2.3:a:cisco:data_center_network_manager:11.3\(1\):*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Cisco Data Center Network Manager",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0.004

Percentile

74.0%