SB2021012720 - Multiple vulnerabilities in Cisco Data Center Network Manager
Published: January 27, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 12 secuirty vulnerabilities.
1) Use of hard-coded credentials (CVE-ID: CVE-2021-1283)
The vulnerability allows a local user to gain access to sensitive information on the system.
The vulnerability exists due to presence of hard-coded credentials in application code. A local user can view sensitive information in the system log file.
2) Improper Certificate Validation (CVE-ID: CVE-2021-1277)
The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.
The vulnerability exists due to missing validation of certificates. A remote attacker can use a specially crafted X.509 certificate, intercept communications and view and alter potentially sensitive information on the target system.
3) Improper Certificate Validation (CVE-ID: CVE-2021-1276)
The vulnerability allows a remote attacker to modify a specific API request that is used to verify a user's authentication token.
The vulnerability exists due to a lack of validation of the SSL certificate used when establishing a connection to the Device Manager application. A remote attacker can send a specially crafted HTTP request and alter a specific API request.
4) SQL injection (CVE-ID: CVE-2021-1248)
The vulnerability allows a remote user to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in a REST API endpoint. A remote administrator can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
5) SQL injection (CVE-ID: CVE-2021-1247)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in a REST API endpoint. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
6) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2021-1272)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input in the session validation feature. A remote attacker can send a specially crafted HTTP request, trick the application to initiate requests to arbitrary systems and gain unauthorized access to the Device Manager application.
7) Improper Authorization (CVE-ID: CVE-2021-1270)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to a failure to limit access to resources that are intended for users with Administrator privileges. A remote authenticated attacker can send a specially crafted HTTP request to edit the configuration.
8) Improper Authorization (CVE-ID: CVE-2021-1269)
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to a failure to limit access to resources that are intended for users with Administrator privileges. A remote authenticated attacker can send a specially crafted HTTP request to list, view, create, edit, and delete specific system configurations.
9) Input validation error (CVE-ID: CVE-2021-1286)
The vulnerability allows a remote attacker to perform a reflected file download attack.
The vulnerability exists due to insufficient validation of user-supplied input in the web-based management interface. A remote attacker can trick a victim to click a link that submits malicious input to the interface and execute arbitrary script code on the target device.
10) Stored cross-site scripting (CVE-ID: CVE-2021-1253)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface. A remote authenticated attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
11) Cross-site scripting (CVE-ID: CVE-2021-1250)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
12) Cross-site scripting (CVE-ID: CVE-2021-1249)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the web-based management interface. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh