#VU9473 Spoofing attack in Cisco Data Center Network Manager


Published: 2017-11-30

Vulnerability identifier: #VU9473

Vulnerability risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12345

CWE-ID: CWE-451

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco Data Center Network Manager
Server applications / Remote management servers, RDP, SSH

Vendor: Cisco Systems, Inc

Description

The disclosed vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to insufficient input validation of user-supplied values in HTTP parameters. A remote attacker can trick the victim into clicking a malicious link, inject malicious HTTP parameter values into HTTP messages and inject malicious content into the content that is displayed by the web interface.

Mitigation
The vulnerability is addressed in the following versions: 10.4(1.41)S0, 10.4(1)S11.




Vulnerable software versions

Cisco Data Center Network Manager: 10.2.1


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-dcnm


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability