CVE-2020-3112

A vulnerability in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to elevate privileges on the application. The vulnerability is due to insufficient access control validation. An attacker could exploit this vulnerability by authenticating with a low-privilege account and sending a crafted request to the API. A successful exploit could allow the attacker to interact with the API with administrative privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-priv-escĀ - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-priv-escĀ - Vendor Advisory

Information

Published : 2020-02-19 20:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3112

Mitre link : CVE-2020-3112

CVE.ORG link : CVE-2020-3112


JSON object : View

Products Affected

cisco

  • data_center_network_manager
CWE
CWE-264

Permissions, Privileges, and Access Controls

CWE-269

Improper Privilege Management