#VU23966 Use of hard-coded credentials in Cisco Data Center Network Manager - CVE-2019-15975
Published: January 6, 2020 / Updated: June 24, 2021
Vulnerability identifier: #VU23966
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2019-15975
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
Cisco Data Center Network Manager
Cisco Data Center Network Manager
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists in the REST API endpoint within the processing of the dbadmin/addUser functionality due to a static encryption key is shared between installations. A remote unauthenticated attacker can access the affected system using the static key to craft a valid session token and perform arbitrary actions through the REST API with administrative privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install updates from vendor's website.