Lucene search

K
ciscoCiscoCISCO-SA-DCNM-BYPASS-DYEEJUMS
HistoryJul 29, 2020 - 4:00 p.m.

Cisco Data Center Network Manager Authentication Bypass Vulnerability

2020-07-2916:00:00
tools.cisco.com
11

0.011 Low

EPSS

Percentile

84.0%

A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device.

The vulnerability exists because different installations share a static encryption key. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-dyEejUMs [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-dyEejUMs”]

0.011 Low

EPSS

Percentile

84.0%

Related for CISCO-SA-DCNM-BYPASS-DYEEJUMS