A vulnerability in the Software Image Management feature of Cisco DNA Center could allow an authenticated, remote attacker to access to internal services without additional authentication. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending arbitrary HTTP requests to internal services. An exploit could allow the attacker to bypass any firewall or other protections to access unauthorized internal services. DNAC versions prior to 1.2.5 are affected.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/108084 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-swim-proxy | Vendor Advisory |
http://www.securityfocus.com/bid/108084 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-swim-proxy | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : 6.5 |
References | () http://www.securityfocus.com/bid/108084 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-swim-proxy - Vendor Advisory |
Information
Published : 2019-04-18 02:29
Updated : 2024-11-21 04:37
NVD link : CVE-2019-1841
Mitre link : CVE-2019-1841
CVE.ORG link : CVE-2019-1841
JSON object : View
Products Affected
cisco
- dna_center