A vulnerability in the identity management service of Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and take complete control of identity management functions. The vulnerability is due to insufficient security restrictions for critical management functions. An attacker could exploit this vulnerability by sending a valid identity management request to the affected system. An exploit could allow the attacker to view and make unauthorized modifications to existing system users as well as create new users.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105502 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-dna-auth-bypass | Vendor Advisory |
http://www.securityfocus.com/bid/105502 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-dna-auth-bypass | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105502 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-dna-auth-bypass - Vendor Advisory |
Information
Published : 2018-10-05 14:29
Updated : 2024-11-21 03:38
NVD link : CVE-2018-0448
Mitre link : CVE-2018-0448
CVE.ORG link : CVE-2018-0448
JSON object : View
Products Affected
cisco
- digital_network_architecture_center
CWE
CWE-326
Inadequate Encryption Strength