Vulnerability CVE-2019-1619


Published: 2019-06-26   Modified: 2019-06-27

Description:
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session management on affected DCNM software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to gain administrative access on the affected device.

See advisories in our WLB2 database:
Topic
Author
Date
High
Cisco Data Center Network Manager Unauthenticated Remote Code Execution
Pedro Ribeiro
03.09.2019
Med.
Cisco Data Center Network Manager Unauthenticated Remote Code Execution (Metasploit)
Pedro Ribeiro
20.09.2019

Type:

CWE-284

(Improper Access Control)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Cisco -> Data center network manager 

 References:
http://packetstormsecurity.com/files/153546/Cisco-Data-Center-Network-Manager-11.1-1-Remote-Code-Execution.html
http://seclists.org/fulldisclosure/2019/Jul/7
http://www.securityfocus.com/bid/108902
https://seclists.org/bugtraq/2019/Jul/11
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-bypass

Copyright 2024, cxsecurity.com

 

Back to Top