Cisco reports a critical vulnerability in the Cisco Data Center Network Manager (DCNM). The automation software is widely used for network hardware in the MDS and product rangesused. In internal testing, the company discovered that a bug in the software’s REST API allowed attackers to bypass authentication and control a device with administrator privileges.
The vulnerability, identified by CVE-2020-3382, is similar to a vulnerability in DCNM that an external security researcher recently discovered. A static key allowed hackers to generate a valid session token and take full control of a device using the REST API.
A static key is also the trigger for the new security vulnerability. “An attacker could exploit this vulnerability by using the static key to create a valid session token. A successful attack could allow the attacker to take arbitrary actions using the REST API with administrator privileges, ”said Cisco.
A patch is already available. Administrators should install the latest version of Cisco DCNM. According to Cisco, no active attacks on the security leak have been reported to date. The company also points out that there is no workaround and only the patch closes the vulnerability.
The error is rated with 9.8 points in the ten-level Common Vulnerability Scoring System (CVSS). The DCNM versions 11.0 (1), 11.1 (1), 11.2 (1) and 11.3 (1) are affected.
According to Cisco, another critical vulnerability lies in the web interface of the SD-WAN vManage software. She has a CVSS score of 9.9 points. Here it is possible to remotely reconfigure a system, switch it off or access confidential information. The trigger is an inadequate check of credentials.
To new heights with SkySQL, the ultimate MariaDB cloud
In this webinar we will introduce SkySQL to you, explain the architecture and explain how it differs from other systemsRDS on. You will also get an insight into the product roadmap, a live demo, and how to get SkySQL up and running in minutes.