Lucene search

K
ciscoCiscoCISCO-SA-DNAC-PRIVESC-QFXE74RS
HistoryMar 22, 2023 - 4:00 p.m.

Cisco DNA Center Privilege Escalation Vulnerability

2023-03-2216:00:00
tools.cisco.com
21
cisco
dna center
privilege escalation
management interface
vulnerability
web-based
software updates

0.001 Low

EPSS

Percentile

39.7%

A vulnerability in the management API of Cisco DNA Center could allow an authenticated, remote attacker to elevate privileges in the context of the web-based management interface on an affected device.

This vulnerability is due to the unintended exposure of sensitive information. An attacker could exploit this vulnerability by inspecting the responses from the API. Under certain circumstances, a successful exploit could allow the attacker to access the API with the privileges of a higher-level user account. To successfully exploit this vulnerability, the attacker would need at least valid Observer credentials.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-privesc-QFXe74RS [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-privesc-QFXe74RS”]

Affected configurations

Vulners
Node
ciscodigital_network_architecture_centerMatchany
OR
ciscodigital_network_architecture_centerMatchany

0.001 Low

EPSS

Percentile

39.7%

Related for CISCO-SA-DNAC-PRIVESC-QFXE74RS