Cisco Data Center Network Manager Improper Authorization (cisco-sa-dcnm-improper-auth-7Krd9TDT)

high Nessus Plugin ID 139468

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco Data Center Network Manager is affected by an authentication bypass vulnerability in the REST API due to insufficient authorization of certain API functions. An attacker can exploit this vulnerability by sending a crafted request to the API using low-privileged credentials in order to perform arbitrary actions through the REST API with administrative privileges.

Please see the included Cisco BID and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvs78207

See Also

http://www.nessus.org/u?9d424285

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvs78207

Plugin Details

Severity: High

ID: 139468

File Name: cisco-sa-dcnm-improper-auth-7Krd9TDT.nasl

Version: 1.4

Type: combined

Family: CISCO

Published: 8/11/2020

Updated: 8/27/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2020-3386

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:data_center_network_manager

Exploit Ease: No known exploits are available

Patch Publication Date: 7/29/2020

Vulnerability Publication Date: 7/29/2020

Reference Information

CVE: CVE-2020-3386

CWE: 285

CISCO-SA: cisco-sa-dcnm-improper-auth-7Krd9TDT

IAVA: 2020-A-0279

CISCO-BUG-ID: CSCvs78207