Vulnerability identifier: #VU9473
Vulnerability risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-451
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco Data Center Network Manager
Server applications /
Remote management servers, RDP, SSH
Vendor: Cisco Systems, Inc
Description
The disclosed vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to insufficient input validation of user-supplied values in HTTP parameters. A remote attacker can trick the victim into clicking a malicious link, inject malicious HTTP parameter values into HTTP messages and inject malicious content into the content that is displayed by the web interface.
Mitigation
The vulnerability is addressed in the following versions: 10.4(1.41)S0, 10.4(1)S11.
Vulnerable software versions
Cisco Data Center Network Manager: 10.2.1
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-dcnm
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.