A vulnerability in the session validation feature of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. This vulnerability is due to insufficient validation of parameters in a specific HTTP request by an attacker. An attacker could exploit this vulnerability by sending a crafted HTTP request to an authenticated user of the DCNM web application. A successful exploit could allow the attacker to bypass access controls and gain unauthorized access to the Device Manager application, which provides access to network devices managed by the system.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2021-01-20T19:56:52.449969Z
Updated: 2024-11-12T20:24:20.068Z
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1272
Vulnrichment
Updated: 2024-08-03T16:02:56.393Z
NVD
Status : Modified
Published: 2021-01-20T20:15:15.830
Modified: 2024-11-21T05:43:58.670
Link: CVE-2021-1272
Redhat
No data.