A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2020-08-26T16:15:33.516378Z
Updated: 2024-11-13T18:13:23.600Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3519
Vulnrichment
Updated: 2024-08-04T07:37:54.652Z
NVD
Status : Modified
Published: 2020-08-26T17:15:14.647
Modified: 2024-11-21T05:31:14.390
Link: CVE-2020-3519
Redhat
No data.