Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2017-11-30 |
Product | Data Center Network Manager | Last view | 2021-12-10 |
Version | 10.2(1) | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:cisco:data_center_network_manager |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
10 | 2021-12-10 | CVE-2021-44228 | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. |
6.1 | 2021-01-20 | CVE-2021-1286 | Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow a remote attacker with network-operator privileges to conduct a cross-site scripting (XSS) attack or a reflected file download (RFD) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. |
5.5 | 2021-01-20 | CVE-2021-1283 | A vulnerability in the logging subsystem of Cisco Data Center Network Manager (DCNM) could allow an authenticated, local attacker to view sensitive information in a system log file that should be restricted. The vulnerability exists because sensitive information is not properly masked before it is written to system log files. An attacker could exploit this vulnerability by authenticating to an affected device and inspecting a specific system log file. A successful exploit could allow the attacker to view sensitive information in the system log file. To exploit this vulnerability, the attacker would need to have valid user credentials. |
6.5 | 2021-01-20 | CVE-2021-1277 | Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory. |
6.5 | 2021-01-20 | CVE-2021-1276 | Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory. |
8.8 | 2021-01-20 | CVE-2021-1272 | A vulnerability in the session validation feature of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. This vulnerability is due to insufficient validation of parameters in a specific HTTP request by an attacker. An attacker could exploit this vulnerability by sending a crafted HTTP request to an authenticated user of the DCNM web application. A successful exploit could allow the attacker to bypass access controls and gain unauthorized access to the Device Manager application, which provides access to network devices managed by the system. |
6.5 | 2021-01-20 | CVE-2021-1270 | Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory. |
6.3 | 2021-01-20 | CVE-2021-1269 | Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory. |
5.4 | 2021-01-20 | CVE-2021-1255 | Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory. |
5.4 | 2021-01-20 | CVE-2021-1253 | Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow a remote attacker with network-operator privileges to conduct a cross-site scripting (XSS) attack or a reflected file download (RFD) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. |
5.4 | 2021-01-20 | CVE-2021-1250 | Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow a remote attacker with network-operator privileges to conduct a cross-site scripting (XSS) attack or a reflected file download (RFD) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. |
5.4 | 2021-01-20 | CVE-2021-1249 | Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow a remote attacker with network-operator privileges to conduct a cross-site scripting (XSS) attack or a reflected file download (RFD) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. |
7.2 | 2021-01-20 | CVE-2021-1248 | Multiple vulnerabilities in certain REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to execute arbitrary SQL commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. |
8.8 | 2021-01-20 | CVE-2021-1247 | Multiple vulnerabilities in certain REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to execute arbitrary SQL commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. |
4.3 | 2021-01-20 | CVE-2021-1135 | Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory. |
7.3 | 2021-01-20 | CVE-2021-1133 | Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory. |
5.4 | 2020-08-26 | CVE-2020-3523 | A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. |
6.3 | 2020-08-26 | CVE-2020-3522 | A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to bypass authorization on an affected device and access sensitive information that is related to the device. The vulnerability exists because the affected software allows users to access resources that are intended for administrators only. An attacker could exploit this vulnerability by submitting a crafted URL to an affected device. A successful exploit could allow the attacker to add, delete, and edit certain network configurations in the same manner as a user with administrative privileges. |
6.5 | 2020-08-26 | CVE-2020-3521 | A vulnerability in a specific REST API of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with a low-privileged account could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to read arbitrary files on the affected system. |
5.5 | 2020-08-26 | CVE-2020-3520 | A vulnerability in Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, local attacker to obtain confidential information from an affected device. The vulnerability is due to insufficient protection of confidential information on an affected device. An attacker at any privilege level could exploit this vulnerability by accessing local filesystems and extracting sensitive information from them. A successful exploit could allow the attacker to view sensitive data, which they could use to elevate their privilege. |
8.1 | 2020-08-26 | CVE-2020-3519 | A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. |
5.4 | 2020-08-26 | CVE-2020-3518 | A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of the affected software. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. |
4.8 | 2020-08-26 | CVE-2020-3439 | A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. |
6.3 | 2020-07-31 | CVE-2020-3462 | A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database. |
5.3 | 2020-07-31 | CVE-2020-3461 | A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. The vulnerability is due to missing authentication on a specific part of the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the interface. A successful exploit could allow the attacker to read confidential information from an affected device. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
28% (15) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
13% (7) | CWE-20 | Improper Input Validation |
9% (5) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
7% (4) | CWE-798 | Use of Hard-coded Credentials |
7% (4) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
5% (3) | CWE-184 | Incomplete Blacklist |
3% (2) | CWE-295 | Certificate Issues |
3% (2) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
1% (1) | CWE-789 | Uncontrolled Memory Allocation |
1% (1) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
1% (1) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
1% (1) | CWE-502 | Deserialization of Untrusted Data |
1% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
1% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
1% (1) | CWE-306 | Missing Authentication for Critical Function |
1% (1) | CWE-269 | Improper Privilege Management |
1% (1) | CWE-200 | Information Exposure |
1% (1) | CWE-88 | Argument Injection or Modification |
SAINT Exploits
Description | Link |
---|---|
Apache Log4j JNDI message lookup vulnerability | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2021-01-28 | Cisco Data Center Network Manager session validation request detected RuleID : 56956 - Type : POLICY-OTHER - Revision : 1 |
2021-01-28 | Cisco Data Center Network Manager SQL injection attempt RuleID : 56954 - Type : SERVER-WEBAPP - Revision : 1 |
2021-01-28 | Cisco Data Center Network Manager SQL injection attempt RuleID : 56947 - Type : SERVER-WEBAPP - Revision : 2 |
2020-12-08 | Cisco Data Center Network Manager SQL injection attempt RuleID : 54895 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-08 | Cisco Data Center Network Manager SQL injection attempt RuleID : 54894 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager privileged API access detected RuleID : 54700 - Type : POLICY-OTHER - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager privileged API access detected RuleID : 54699 - Type : POLICY-OTHER - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager privileged API access detected RuleID : 54698 - Type : POLICY-OTHER - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager privileged API access detected RuleID : 54697 - Type : POLICY-OTHER - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager privileged API access detected RuleID : 54696 - Type : POLICY-OTHER - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager directory traversal attempt RuleID : 54668 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | TAR file directory traversal attempt RuleID : 54667 - Type : FILE-OTHER - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager command injection attempt RuleID : 54655 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | TAR file directory traversal attempt RuleID : 53504 - Type : FILE-OTHER - Revision : 5 |
2020-12-05 | Cisco Data Center Network Manager cross site request forgery attempt RuleID : 53176 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager cross site request forgery attempt RuleID : 53175 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager saveDefaultCredentials detected RuleID : 53174 - Type : POLICY-OTHER - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager server properties update detected RuleID : 53173 - Type : POLICY-OTHER - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager SanWS importTS arbitrary file upload attempt RuleID : 52547 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager LanFabricImpl createLanFabric command injec... RuleID : 52546 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager directory traversal attempt RuleID : 52545 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager SQL injection attempt RuleID : 52544 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager SQL injection attempt RuleID : 52543 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager displayServerInfos information disclosure a... RuleID : 52542 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | Cisco Data Center Network Manager directory traversal attempt RuleID : 52541 - Type : SERVER-WEBAPP - Revision : 1 |