This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2018-04-19
Product Digital Network Architecture Center Last view 2020-07-02
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:cisco:digital_network_architecture_center:1.1:*:*:*:*:*:*:* 9
cpe:2.3:a:cisco:digital_network_architecture_center:1.1:-:*:*:*:*:*:* 9
cpe:2.3:a:cisco:digital_network_architecture_center:1.1.1:*:*:*:*:*:*:* 9
cpe:2.3:a:cisco:digital_network_architecture_center:*:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:digital_network_architecture_center:1.1.2:*:*:*:*:*:*:* 8
cpe:2.3:a:cisco:digital_network_architecture_center:1.1.3:*:*:*:*:*:*:* 7
cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:* 5

Related : CVE

  Date Alert Description
6.5 2020-07-02 CVE-2020-3391

A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text. The vulnerability is due to insecure storage of certain unencrypted credentials on an affected device. An attacker could exploit this vulnerability by viewing the network device configuration and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.

8.8 2020-06-03 CVE-2020-3281

A vulnerability in the audit logging component of Cisco Digital Network Architecture (DNA) Center could allow an authenticated, remote attacker to view sensitive information in clear text. The vulnerability is due to the storage of certain unencrypted credentials. An attacker could exploit this vulnerability by accessing the audit logs and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to discover and manage network devices.

9.3 2019-06-19 CVE-2019-1848

A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, adjacent attacker to bypass authentication and access critical internal services. The vulnerability is due to insufficient access restriction to ports necessary for system operation. An attacker could exploit this vulnerability by connecting an unauthorized network device to the subnet designated for cluster services. A successful exploit could allow an attacker to reach internal services that are not hardened for external access.

7.5 2019-02-07 CVE-2019-1675

A vulnerability in the default configuration of the Cisco Aironet Active Sensor could allow an unauthenticated, remote attacker to restart the sensor. The vulnerability is due to a default local account with a static password. The account has privileges only to reboot the device. An attacker could exploit this vulnerability by guessing the account name and password to access the CLI. A successful exploit could allow the attacker to reboot the device repeatedly, creating a denial of service (DoS) condition. It is not possible to change the configuration or view sensitive data with this account. Versions prior to DNAC1.2.8 are affected.

9.8 2018-10-05 CVE-2018-15386

A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and have direct unauthorized access to critical management functions. The vulnerability is due to an insecure default configuration of the affected system. An attacker could exploit this vulnerability by directly connecting to the exposed services. An exploit could allow the attacker to retrieve and modify critical system files.

9.8 2018-10-05 CVE-2018-0448

A vulnerability in the identity management service of Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and take complete control of identity management functions. The vulnerability is due to insufficient security restrictions for critical management functions. An attacker could exploit this vulnerability by sending a valid identity management request to the affected system. An exploit could allow the attacker to view and make unauthorized modifications to existing system users as well as create new users.

7.5 2018-08-06 CVE-2018-5390

Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.

9.8 2018-05-16 CVE-2018-0271

A vulnerability in the API gateway of the Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and access critical services. The vulnerability is due to a failure to normalize URLs prior to servicing requests. An attacker could exploit this vulnerability by submitting a crafted URL designed to exploit the issue. A successful exploit could allow the attacker to gain unauthenticated access to critical services, resulting in elevated privileges in DNA Center. This vulnerability affects Cisco DNA Center Software Releases prior to 1.1.2. Cisco Bug IDs: CSCvi09394.

10 2018-05-16 CVE-2018-0268

A vulnerability in the container management subsystem of Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and gain elevated privileges. This vulnerability is due to an insecure default configuration of the Kubernetes container management subsystem within DNA Center. An attacker who has the ability to access the Kubernetes service port could execute commands with elevated privileges within provisioned containers. A successful exploit could result in a complete compromise of affected containers. This vulnerability affects Cisco DNA Center Software Releases 1.1.3 and prior. Cisco Bug IDs: CSCvi47253.

10 2018-05-16 CVE-2018-0222

A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to log in to an affected system by using an administrative account that has default, static user credentials. The vulnerability is due to the presence of undocumented, static user credentials for the default administrative account for the affected software. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands with root privileges. This vulnerability affects all releases of Cisco DNA Center Software prior to Release 1.1.3. Cisco Bug IDs: CSCvh98929.

4.3 2018-04-19 CVE-2018-0269

A vulnerability in the web framework of the Cisco Digital Network Architecture Center (DNA Center) could allow an unauthenticated, remote attacker to communicate with the Kong API server without restriction. The vulnerability is due to an overly permissive Cross Origin Resource Sharing (CORS) policy. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. An exploit could allow the attacker to communicate with the API and exfiltrate sensitive information. Cisco Bug IDs: CSCvh99208.

CWE : Common Weakness Enumeration

%idName
22% (2) CWE-798 Use of Hard-coded Credentials
11% (1) CWE-668 Exposure of Resource to Wrong Sphere
11% (1) CWE-532 Information Leak Through Log Files
11% (1) CWE-522 Insufficiently Protected Credentials
11% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
11% (1) CWE-358 Improperly Implemented Security Check for Standard
11% (1) CWE-326 Inadequate Encryption Strength
11% (1) CWE-287 Improper Authentication

Snort® IPS/IDS

Date Description
2020-12-05 Cisco DNA Center unauthenticated user creation attempt
RuleID : 48023 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Kubernetes Kubelet arbitrary command execution attempt
RuleID : 46741 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Kubernetes Kubelet arbitrary command execution attempt
RuleID : 46740 - Type : SERVER-WEBAPP - Revision : 2
2020-12-05 Cisco DNA Center API default login attempt
RuleID : 46739 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco DNA Center API directory traversal attempt
RuleID : 46738 - Type : SERVER-WEBAPP - Revision : 1

Nessus® Vulnerability Scanner

id Description
2019-01-10 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10917_184R1.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL95343321.nasl - Type: ACT_GATHER_INFO
2018-12-05 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-2_0-0101.nasl - Type: ACT_GATHER_INFO
2018-10-26 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1345.nasl - Type: ACT_GATHER_INFO
2018-10-25 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1322.nasl - Type: ACT_GATHER_INFO
2018-09-04 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1278.nasl - Type: ACT_GATHER_INFO
2018-09-04 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1279.nasl - Type: ACT_GATHER_INFO
2018-08-31 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2018-063.nasl - Type: ACT_GATHER_INFO
2018-08-20 Name: The remote Virtuozzo host is missing multiple security updates.
File: Virtuozzo_VZA-2018-055.nasl - Type: ACT_GATHER_INFO
2018-08-16 Name: The remote Debian host is missing a security update.
File: debian_DLA-1466.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2384.nasl - Type: ACT_GATHER_INFO
2018-08-15 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-2390.nasl - Type: ACT_GATHER_INFO
2018-08-07 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1050.nasl - Type: ACT_GATHER_INFO
2018-08-07 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1049.nasl - Type: ACT_GATHER_INFO
2018-08-07 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4266.nasl - Type: ACT_GATHER_INFO