SB2020081914 - Multiple vulnerabilities in Cisco Data Center Network Manager



SB2020081914 - Multiple vulnerabilities in Cisco Data Center Network Manager

Published: August 19, 2020

Security Bulletin ID SB2020081914
Severity
Medium
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 60% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Stored Cross-site scripting (CVE-ID: CVE-2020-3439)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


2) Cross-site scripting (CVE-ID: CVE-2020-3518)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


3) Cross-site scripting (CVE-ID: CVE-2020-3523)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


4) Path traversal (CVE-ID: CVE-2020-3519)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software . A remote attacker can send a specially crafted HTTP request and overwrite arbitrary files on the affected device.


5) Input validation error (CVE-ID: CVE-2020-3538)

The vulnerability allows a remote user to list or overwrite files on the device.

The vulnerability exists due to insufficient validation of user-supplied input in a certain REST API endpoint of Cisco Data Center Network Manager (DCNM) Software. A remote user can send a specially crafted HTTP request to the system and list of overwrite arbitrary files on the system.


6) Improper Authorization (CVE-ID: CVE-2020-3540)

The vulnerability allows a remote user to gain access to otherwise restricted functionality.

The vulnerability exists due to insufficient authorization checks in the web-based management interface of Cisco Data Center Network Manager (DCNM). A remote authenticated user can gain access to administrative functionality and view, modify, and delete data without proper authorization.


7) Improper Authorization (CVE-ID: CVE-2020-3539)

The vulnerability allows a remote user to gain access to otherwise restricted functionality.

The vulnerability exists due to insufficient authorization checks in the web-based management interface of Cisco Data Center Network Manager (DCNM). A remote authenticated user can gain access to administrative functionality and view, modify, and delete data without proper authorization.



8) Improper access control (CVE-ID: CVE-2020-3522)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software. A remote user can bypass implemented security restrictions and access resources that are intended for administrators only.


9) Information disclosure (CVE-ID: CVE-2020-3520)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A local user can gain unauthorized access to sensitive information on the system.


10) Path traversal (CVE-ID: CVE-2020-3521)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in a specific REST API of Cisco Data Center Network Manager (DCNM) Software. A remote authenticated user can send a specially crafted HTTP request and read arbitrary files on the system.


Remediation

Install update from vendor's website.