SB2021012720 - Multiple vulnerabilities in Cisco Data Center Network Manager



SB2021012720 - Multiple vulnerabilities in Cisco Data Center Network Manager

Published: January 27, 2021

Security Bulletin ID SB2021012720
Severity
Medium
Patch available
YES
Number of vulnerabilities 12
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 58% Low 42%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 12 secuirty vulnerabilities.


1) Use of hard-coded credentials (CVE-ID: CVE-2021-1283)

The vulnerability allows a local user to gain access to sensitive information on the system.

The vulnerability exists due to presence of hard-coded credentials in application code. A local user can view sensitive information in the system log file.


2) Improper Certificate Validation (CVE-ID: CVE-2021-1277)

The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.

The vulnerability exists due to missing validation of certificates. A remote attacker can use a specially crafted X.509 certificate, intercept communications and view and alter potentially sensitive information on the target system.


3) Improper Certificate Validation (CVE-ID: CVE-2021-1276)

The vulnerability allows a remote attacker to modify a specific API request that is used to verify a user's authentication token.

The vulnerability exists due to a lack of validation of the SSL certificate used when establishing a connection to the Device Manager application. A remote attacker can send a specially crafted HTTP request and alter a specific API request.


4) SQL injection (CVE-ID: CVE-2021-1248)

The vulnerability allows a remote user to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in a REST API endpoint. A remote administrator can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


5) SQL injection (CVE-ID: CVE-2021-1247)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in a REST API endpoint. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


6) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2021-1272)

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input in the session validation feature. A remote attacker can send a specially crafted HTTP request, trick the application to initiate requests to arbitrary systems and gain unauthorized access to the Device Manager application.


7) Improper Authorization (CVE-ID: CVE-2021-1270)

The vulnerability allows a remote attacker to bypass authorization checks.

The vulnerability exists due to a failure to limit access to resources that are intended for users with Administrator privileges. A remote authenticated attacker can send a specially crafted HTTP request to edit the configuration.


8) Improper Authorization (CVE-ID: CVE-2021-1269)

The vulnerability allows a remote attacker to bypass authorization checks.

The vulnerability exists due to a failure to limit access to resources that are intended for users with Administrator privileges. A remote authenticated attacker can send a specially crafted HTTP request to list, view, create, edit, and delete specific system configurations.


9) Input validation error (CVE-ID: CVE-2021-1286)

The vulnerability allows a remote attacker to perform a reflected file download attack.

The vulnerability exists due to insufficient validation of user-supplied input in the web-based management interface. A remote attacker can trick a victim to click a link that submits malicious input to the interface and execute arbitrary script code on the target device.


10) Stored cross-site scripting (CVE-ID: CVE-2021-1253)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface. A remote authenticated attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


11) Cross-site scripting (CVE-ID: CVE-2021-1250)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


12) Cross-site scripting (CVE-ID: CVE-2021-1249)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


Remediation

Install update from vendor's website.