-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0246
Cisco Data Center Network Manager multiple vulnerabilities
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Data Center Network Manager
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Modify Arbitrary Files -- Existing Account
Delete Arbitrary Files -- Existing Account
Cross-site Scripting -- Remote with User Interaction
Access Confidential Data -- Remote/Unauthenticated
Reduced Security -- Remote/Unauthenticated
Unauthorised Access -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-1286 CVE-2021-1283 CVE-2021-1277
CVE-2021-1276 CVE-2021-1272 CVE-2021-1270
CVE-2021-1269 CVE-2021-1255 CVE-2021-1253
CVE-2021-1250 CVE-2021-1249 CVE-2021-1248
CVE-2021-1247 CVE-2021-1135 CVE-2021-1133
CVE-2020-1276
Reference: ASB-2020.0107
ESB-2020.3874
ESB-2020.3402
ESB-2020.3063
ESB-2020.2532
ESB-2020.2009.3
ESB-2020.1899
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh
Comment: This bulletin contains seven (7) Cisco Systems security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Data Center Network Manager Authorization Bypass Vulnerabilities
Priority: Medium
Advisory ID: cisco-sa-dcnm-authbypass-OHBPbxu
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvu57868 CSCvv87627
CVE Names: CVE-2021-1269 CVE-2021-1270
Summary
o Multiple vulnerabilities in the web-based management interface of Cisco
Data Center Network Manager (DCNM) could allow an authenticated, remote
attacker to view, modify, and delete data without proper authorization.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu
Affected Products
o Vulnerable Products
At the time of publication, these vulnerabilities affected Cisco DCNM
releases earlier than Release 11.5(1).
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Details
o The vulnerabilities are not dependent on one another; exploitation of one
of the vulnerabilities is not required to exploit the other vulnerability.
In addition, a software release that is affected by one of the
vulnerabilities may not be affected by the other vulnerability.
Details about the vulnerabilities are as follows:
CVE-2021-1270: Cisco DCNM Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco DCNM could
allow an authenticated, remote attacker to modify the configuration without
proper authorization.
This vulnerability is due to a failure to limit access to resources that
are intended for users with Administrator privileges. An attacker could
exploit this vulnerability by sending a crafted HTTP request to an affected
device. A successful exploit could allow a low-privileged attacker to edit
the configuration. To exploit this vulnerability, an attacker would need
valid nonadministrative credentials.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv87627
CVE-ID: CVE-2021-1270
Security Impact Rating (SIR): Medium
CVSS Base Score: 7.1
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
CVE-2021-1269: Cisco DCNM Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco DCNM could
allow an authenticated, remote attacker to bypass authorization on an
affected device and access sensitive information that is related to the
device.
This vulnerability is due to a failure to limit access to resources that
are intended for users with Administrator privileges. An attacker could
exploit this vulnerability by sending a crafted HTTP request to an affected
device. A successful exploit could allow a low-privileged attacker to list,
view, create, edit, and delete specific system configurations in the same
manner as a user with Administrator privileges.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvu57868
CVE-ID: CVE-2021-1269
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.3
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco DCNM releases 11.5(1) and later contained
the fix for these vulnerabilities.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager Certificate Validation Vulnerabilities
Priority: High
Advisory ID: cisco-sa-dcnm-cert-check-BdZZV9T3
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv35346 CSCvv35348 CSCvv35354 CSCvv82441
CVE Names: CVE-2021-1276 CVE-2021-1277
CWEs: CWE-295
Summary
o Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could
allow an attacker to spoof a trusted host or construct a man-in-the-middle
attack to extract sensitive information or alter certain API requests.
These vulnerabilities are due to insufficient certificate validation when
establishing HTTPS requests with the affected device.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3
Affected Products
o Vulnerable Products
These vulnerabilities affect Cisco Data Center Network Manager releases
earlier than 11.5(1).
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Details
o The vulnerabilities are not dependent on one another; exploitation of one
of the vulnerabilities is not required to exploit the other vulnerability.
In addition, a software release that is affected by one of the
vulnerabilities may not be affected by the other vulnerability.
Details about the vulnerabilities are as follows:
CVE-2020-1276: Cisco Data Center Network Manager Certificate Validation
Vulnerability
A vulnerability in the Device Manager application of Cisco DCNM could allow
an unauthenticated, remote attacker to modify a specific API request that
is used to verify a user's authentication token.
This vulnerability is due to a lack of validation of the SSL certificate
used when establishing a connection to the Device Manager application. An
attacker could exploit this vulnerability by sending a crafted HTTP request
to an affected device. A successful exploit could allow the attacker to
alter a specific API request.
Bug ID(s): CSCvv82441
CVE ID: CVE-2021-1276
Security Impact Rating (SIR): High
CVSS Base Score: 7.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2021-1277: Cisco Data Center Network Manager Certificate Validation
Vulnerability
A vulnerability in Cisco DCNM could allow an unauthenticated, remote
attacker to spoof a trusted host or construct a man-in-the-middle attack to
extract sensitive information from the affected device.
This vulnerability is due to a lack of certificate validation. An attacker
could exploit this vulnerability by using a crafted X.509 certificate and
could then intercept communications. A successful exploit could allow the
attacker to view and alter potentially sensitive information that DCNM
maintains about clients that are connected to the network.
Bug ID(s): CSCvv35348 , CSCvv35346 , CSCvv35354
CVE ID: CVE-2021-1277
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o Cisco has released free software updates that address the vulnerabilities
described in this advisory. Customers may only install and expect support
for software versions and feature sets for which they have purchased a
license. By installing, downloading, accessing, or otherwise using such
software upgrades, customers agree to follow the terms of the Cisco
software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html
Additionally, customers may only download software for which they have a
valid license, procured from Cisco directly, or through a Cisco authorized
reseller or partner. In most cases this will be a maintenance upgrade to
software that was previously purchased. Free security software updates do
not entitle customers to a new software license, additional software
feature sets, or major revision upgrades.
When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service
contract and customers who make purchases through third-party vendors but
are unsuccessful in obtaining fixed software through their point of sale
should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
/en/us/support/web/tsd-cisco-worldwide-contacts.html
Customers should have the product serial number available and be prepared
to provide the URL of this advisory as evidence of entitlement to a free
upgrade.
Fixed Releases
Cisco fixed these vulnerabilities in Cisco DCNM releases 11.5(1) and later.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager Information Disclosure Vulnerability
Priority: Medium
Advisory ID: cisco-sa-dcnm-info-disc-QCSJB6YG
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv07941 CSCvv07942 CSCvv07945 CSCvv07947
CVE Names: CVE-2021-1283
CWEs: CWE-789
Summary
o A vulnerability in the logging subsystem of Cisco Data Center Network
Manager (DCNM) could allow an authenticated, local attacker to view
sensitive information in a system log file that should be restricted.
The vulnerability exists because sensitive information is not properly
masked before it is written to system log files. An attacker could exploit
this vulnerability by authenticating to an affected device and inspecting a
specific system log file. A successful exploit could allow the attacker to
view sensitive information in the system log file. To exploit this
vulnerability, the attacker would need to have valid user credentials.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected Cisco DCNM releases
earlier than Release 11.5(1).
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco DCNM releases 11.5(1) and later contained
the fix for this vulnerability.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager REST API Vulnerabilities
Priority: Medium
Advisory ID: cisco-sa-dcnm-api-path-TpTApx2p
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvt82606 CSCvu28383 CSCvu28385
CVE Names: CVE-2021-1133 CVE-2021-1135 CVE-2021-1255
CWEs: CWE-184 CWE-20 CWE-807
CVSS Score:
6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:X/RL:X/RC:X
Summary
o Multiple vulnerabilities in the REST API endpoint of Cisco Data Center
Network Manager (DCNM) could allow an authenticated, remote attacker to
view, modify, and delete data without proper authorization.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p
Affected Products
o Vulnerable Products
At the time of publication, these vulnerabilities affected Cisco DCNM
releases earlier than Release 11.4(1).
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Details
o The vulnerabilities are not dependent on one another. Exploitation of one
of the vulnerabilities is not required to exploit the other
vulnerabilities. In addition, a software release that is affected by one of
the vulnerabilities may not be affected by the other vulnerabilities.
Details about the vulnerabilities are as follows.
CVE-2021-1133: Cisco Data Center Network Manager Path Traversal
Vulnerability
A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM)
could allow an authenticated, remote attacker with a low-privilege account
to conduct a path traversal attack on an affected device.
The vulnerability is due to insufficient validation of user-supplied input
to the API. An attacker could exploit this vulnerability by sending a
crafted request to the API. A successful exploit could allow the attacker
to delete arbitrary files on the file system.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvt82606
CVE-ID: CVE-2021-1133
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-1255: Cisco Data Center Network Manager Path Traversal
Vulnerability
A vulnerability in a certain REST API endpoint of Cisco Data Center Network
Manager (DCNM) could allow an authenticated, remote attacker to perform a
path traversal attack on an affected device.
The vulnerability is due to insufficient path restriction enforcement. An
attacker could exploit this vulnerability by sending crafted HTTP requests
to an affected device. A successful exploit could allow the attacker to
overwrite or list arbitrary files on the affected device.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvu28383
CVE-ID: CVE-2021-1255
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.6
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CVE-2021-1135: Cisco DCNM Software Configuration Bypass Vulnerability
A vulnerability in a certain REST API endpoint of Cisco Data Center Network
Manager could allow an authenticated, remote attacker to bypass security
controls and modify default server configuration settings on the affected
device.
The vulnerability is due to an incorrect comparison in a denylist
implementation. An attacker could exploit this vulnerability by sending
specially crafted network traffic to the affected software. A successful
exploit could allow the attacker to modify server configuration settings on
the affected device.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvu28385
CVE-ID: CVE-2021-1135
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.3
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco DCNM releases 11.4(1) and later contained
the fix for these vulnerabilities.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager SQL Injection Vulnerabilities
Priority: High
Advisory ID: cisco-sa-dcnm-sql-inj-OAQOObP
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv82432 CSCvv82433
CVE Names: CVE-2021-1247 CVE-2021-1248
CWEs: CWE-89
Summary
o Multiple vulnerabilities in certain REST API endpoints of Cisco Data Center
Network Manager (DCNM) could allow an authenticated, remote attacker to
execute arbitrary SQL commands on an affected device.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP
Affected Products
o Vulnerable Products
These vulnerabilities affect Cisco DCNM releases earlier than Release 11.5
(1).
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Details
o The vulnerabilities are not dependent on one another. Exploitation of one
of the vulnerabilities is not required to exploit the other vulnerability.
In addition, a software release that is affected by one of the
vulnerabilities may not be affected by the other vulnerability.
Details about the vulnerabilities are as follows.
CVE-2021-1247: Cisco DCNM SQL Injection Vulnerability
A vulnerability in a REST API endpoint of Cisco DCNM could allow an
authenticated, remote attacker with lower-level privileges to execute
arbitrary SQL commands on an affected device.
This vulnerability is due to insufficient validation of user-supplied input
to the API. An attacker with lower-level privileges, such as
network-operator , could exploit this vulnerability by sending a crafted
request to the API. A successful exploit could allow the attacker to view
information that they are not authorized to view, make changes to the
system that they are not authorized to make, or execute commands within the
underlying operating system that may affect the availability of the device.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv82432
CVE ID: CVE-2021-1247
Security Impact Rating (SIR): High
CVSS Base Score: 8.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-1248: Cisco DCNM SQL Injection Vulnerability
A vulnerability in a REST API endpoint of Cisco DCNM could allow an
authenticated, remote attacker with administrative privileges to execute
arbitrary SQL commands on an affected device.
This vulnerability is due to insufficient validation of user-supplied input
to the API. An attacker with administrative privileges could exploit this
vulnerability by sending a crafted request to the API. A successful exploit
could allow the attacker to view information that they are not authorized
to view, make changes to the system that they are not authorized to make,
or execute commands within the underlying operating system that may affect
the availability of the device.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv82433
CVE ID: CVE-2021-1248
Security Impact Rating (SIR): High
CVSS Base Score: 7.2
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o Cisco has released free software updates that address the vulnerabilities
described in this advisory. Customers may only install and expect support
for software versions and feature sets for which they have purchased a
license. By installing, downloading, accessing, or otherwise using such
software upgrades, customers agree to follow the terms of the Cisco
software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html
Additionally, customers may only download software for which they have a
valid license, procured from Cisco directly, or through a Cisco authorized
reseller or partner. In most cases this will be a maintenance upgrade to
software that was previously purchased. Free security software updates do
not entitle customers to a new software license, additional software
feature sets, or major revision upgrades.
When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service
contract and customers who make purchases through third-party vendors but
are unsuccessful in obtaining fixed software through their point of sale
should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
/en/us/support/web/tsd-cisco-worldwide-contacts.html
Customers should have the product serial number available and be prepared
to provide the URL of this advisory as evidence of entitlement to a free
upgrade.
Fixed Releases
Cisco fixed these vulnerabilities in Cisco DCNM releases 11.5(1) and later.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability
Priority: High
Advisory ID: cisco-sa-dcnm-ssrf-F2vX6q5p
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv82444
CVE Names: CVE-2021-1272
CWEs: CWE-918
Summary
o A vulnerability in the session validation feature of Cisco Data Center
Network Manager (DCNM) could allow an unauthenticated, remote attacker to
bypass access controls and conduct a server-side request forgery (SSRF)
attack on a targeted system.
This vulnerability is due to insufficient validation of parameters in a
specific HTTP request by an attacker. An attacker could exploit this
vulnerability by sending a crafted HTTP request to an authenticated user of
the DCNM web application. A successful exploit could allow the attacker to
bypass access controls and gain unauthorized access to the Device Manager
application, which provides access to network devices managed by the
system.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p
Affected Products
o Vulnerable Products
This vulnerability affects Cisco DCNM Software if it is running a release
earlier than 11.5(1).
This vulnerability affects DCNM-Storage Area Network (SAN) deployments ,
including the following:
Open Virtual Appliance (OVA) deployments
Windows DCNM-SAN installations
Linux DCNM-SAN installations
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o Cisco has released free software updates that address the vulnerability
described in this advisory. Customers may only install and expect support
for software versions and feature sets for which they have purchased a
license. By installing, downloading, accessing, or otherwise using such
software upgrades, customers agree to follow the terms of the Cisco
software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html
Additionally, customers may only download software for which they have a
valid license, procured from Cisco directly, or through a Cisco authorized
reseller or partner. In most cases this will be a maintenance upgrade to
software that was previously purchased. Free security software updates do
not entitle customers to a new software license, additional software
feature sets, or major revision upgrades.
When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service
contract and customers who make purchases through third-party vendors but
are unsuccessful in obtaining fixed software through their point of sale
should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
/en/us/support/web/tsd-cisco-worldwide-contacts.html
Customers should have the product serial number available and be prepared
to provide the URL of this advisory as evidence of entitlement to a free
upgrade.
Fixed Releases
Cisco fixed this vulnerability in Cisco DCNM software releases 11.5(1) and
later.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager Vulnerabilities
Priority: Medium
Advisory ID: cisco-sa-dcnm-xss-vulns-GuUJ39gh
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvu50101 CSCvu68933 CSCvv00638 CSCvv00642 CSCvv00643
CSCvv00644 CSCvv00645 CSCvv00646 CSCvv00654 CSCvv07930
CSCvv87589 CSCvv87602 CSCvv87608 CSCvv87614
CVE Names: CVE-2021-1249 CVE-2021-1250 CVE-2021-1253 CVE-2021-1286
CWEs: CWE-20 CWE-79
Summary
o Multiple vulnerabilities in the web-based management interface of Cisco
Data Center Network Manager (DCNM) could allow a remote attacker with
network-operator privileges to conduct a cross-site scripting (XSS) attack
or a reflected file download (RFD) attack against a user of the interface.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh
Affected Products
o Vulnerable Products
At the time of publication, these vulnerabilities affected Cisco DCNM
releases earlier than Release 11.5(1).
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Details
o The vulnerabilities are not dependent on one another. Exploitation of one
of the vulnerabilities is not required to exploit the other vulnerability.
In addition, a software release that is affected by one of the
vulnerabilities may not be affected by the other vulnerability.
Details about the vulnerabilities are as follows.
CVE-2021-1249: Cisco DCNM Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco
DCNM could allow an authenticated, remote attacker to conduct an XSS attack
against a user of the interface.
These vulnerabilities are due to insufficient input validation by the
web-based management interface. An attacker could exploit these
vulnerabilities by inserting malicious data into a specific data field in
the interface. A successful exploit could allow the attacker to execute
arbitrary script code in the context of the affected interface or access
sensitive, browser-based information.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
Bug ID(s): CSCvv00645 , CSCvu50101 , CSCvu49711 , CSCvu68933
CVE ID: CVE-2021-1249
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
CVE-2021-1286: Cisco DCNM Reflected File Download Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco
DCNM could allow an unauthenticated, remote attacker to conduct an RFD
attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied
input by the web-based management interface. An attacker could exploit
these vulnerabilities by persuading an authenticated user of the interface
to click a link that submits malicious input to the interface. A successful
exploit could allow the attacker to execute arbitrary script code on the
affected device.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
Bug ID(s): CSCvv87608 , CSCvv87589 , CSCvv87602
CVE ID: CVE-2021-1286
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.1
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
CVE-2021-1250: Cisco DCNM Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco
DCNM could allow an authenticated, remote attacker to conduct an XSS attack
against a user of the interface.
These vulnerabilities are due to insufficient input validation by the
web-based management interface. An attacker could exploit these
vulnerabilities by inserting malicious data into a specific data field in
the interface. A successful exploit could allow the attacker to execute
arbitrary script code in the context of the affected interface or access
sensitive, browser-based information.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
Bug ID(s): CSCvv00642 , CSCvv87614 , CSCvv00638 , CSCvv00644 , CSCvv00654 ,
CSCvv00643
CVE ID: CVE-2021-1250
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.9
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
CVE-2021-1253: Cisco DCNM Persistent Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco
DCNM could allow an authenticated, remote attacker to conduct an XSS attack
against a user of the interface.
These vulnerabilities are due to insufficient input validation by the
web-based management interface. An attacker could exploit these
vulnerabilities by inserting malicious data into a specific data field in
the interface. A successful exploit could allow the attacker to execute
arbitrary script code in the context of the affected interface or access
sensitive, browser-based information.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
Bug ID(s): CSCvv07930 , CSCvv00646
CVE ID: CVE-2021-1253
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.9
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco Data Center Network Manager releases 11.5
(1) and later contained the fix for these vulnerabilities.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQIVAwUBYAkX2uNLKJtyKPYoAQhBPw//Sf6Ygf/j2PMfs3S+wzBCEt2z47IGbgsK
t5zkciYRd56y+0y+SGs3oniZTFbd19gLN4WqzYcavLcJFGzBHvPnq78G+tLnts5J
OlM4DCilgcyaVPPA3mz6doKL8ttNeVnXWVVkMSxQnJIKCuPci6Sys/fJoGBbX0NJ
ROeeqQa4CZRgeH8ecyy3tvpPapRbXC+Xuye058KQOl0Ei06zxuO9LwAVB2kYLsbw
3O2x61xOInuwcMNasPq/EkyFKvL2zQnWfUWG1qTCGLOWqtlh6bM6zvAsDIpYm6Sw
QJ+/u7Y7Qtk5mtGihIWxNEsW9KUIqHcR91Fu3n0nizTobtw25yeCeW2otdAEZcyH
bg79/wmUpnYnKX5pmJlD5i2TE8GTevVTh2dfCyd8eJH5fHDDp5kFFA0Ski+kBEoB
VuTowQdeeWu58cyEdInZJ/gDoVt6wEnsOCVpE/Gjc3QupOIV/55cHU0RQyUY1g8Z
uowsqwAanE8C1E9b8sH81v7pj2Wrz23PrypasCHBbDND9Jatqa26GstMsyZ7fthf
qz5eNgz9qvPeRQxVDEyFjl4yTAQQ8ALYjv8WIAEvD7oyi3x/Yt+cae/fjUeigfS9
1m0vmH2v7kantc29yctj9VCHFDquAvkmSznnB31W4lujIDty2/lydPmYb/AXUOJc
dXhNryjzQ54=
=QwFo
-----END PGP SIGNATURE-----
The post ESB-2021.0246 – [Cisco] Cisco Data Center Network Manager: Multiple vulnerabilities appeared first on Malware Devil.
https://malwaredevil.com/2021/01/21/esb-2021-0246-cisco-cisco-data-center-network-manager-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0246-cisco-cisco-data-center-network-manager-multiple-vulnerabilities
No comments:
Post a Comment