Cisco Data Center Network Manager Authentication Bypass (cisco-sa-dcnm-bypass-dyEejUMs)

critical Nessus Plugin ID 139516

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco Data Center Network Manager is affected by an authentication bypass vulnerability in the REST API due to shared use of a static encryption key between installations. An unauthenticated, remote attacker can exploit this vulnerability to bypass authentication and execute arbitrary actions with administrative privileges on an affected device.

Please see the included Cisco BID and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvt41161

See Also

http://www.nessus.org/u?6ba35e2d

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt41161

Plugin Details

Severity: Critical

ID: 139516

File Name: cisco-sa-dcnm-bypass-dyEejUMs.nasl

Version: 1.5

Type: combined

Family: CISCO

Published: 8/12/2020

Updated: 10/4/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-3382

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:data_center_network_manager

Exploit Ease: No known exploits are available

Patch Publication Date: 7/29/2020

Vulnerability Publication Date: 7/29/2020

Reference Information

CVE: CVE-2020-3382

CWE: 798

CISCO-SA: cisco-sa-dcnm-bypass-dyEejUMs

IAVA: 2020-A-0279-S

CISCO-BUG-ID: CSCvt41161