A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session management on affected DCNM software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to gain administrative access on the affected device.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-bypass | vendor advisory |
http://www.securityfocus.com/bid/108902 | vdb entry third party advisory |
https://seclists.org/bugtraq/2019/Jul/11 | third party advisory mailing list |
http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html | vdb entry third party advisory |
http://seclists.org/fulldisclosure/2019/Jul/7 | third party advisory mailing list |
http://packetstormsecurity.com/files/154304/Cisco-Data-Center-Network-Manager-Unauthenticated-Remote-Code-Execution.html | vdb entry third party advisory |