A vulnerability in a certain REST API endpoint of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to perform a path traversal attack on an affected device.
The vulnerability is due to insufficient path restriction enforcement. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to overwrite or list arbitrary files on the affected device.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 18 Nov 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in a certain REST API endpoint of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient path restriction enforcement. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to overwrite or list arbitrary files on the affected device.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | |
Title | Cisco Data Center Network Manager Path Traversal Vulnerability | |
Weaknesses | CWE-20 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-11-18T15:53:59.243Z
Updated: 2024-11-18T16:25:34.969Z
Reserved: 2019-12-12T00:00:00.000Z
Link: CVE-2020-3538
Vulnrichment
Updated: 2024-11-18T16:25:29.740Z
NVD
Status : Awaiting Analysis
Published: 2024-11-18T16:15:07.660
Modified: 2024-11-18T17:11:17.393
Link: CVE-2020-3538
Redhat
No data.