Cisco issues critical patches for Data Center Network Manager

According to multiple security advisories from Cisco, two critical patches were released for vulnerabilities in the Data Center Network Manager. Both vulnerabilities register as a 9.8 out of 10 on the Common Vulnerability Scoring System (CVSS) scale. In layman’s terms, this is about as serious as a security flaw can get. Here’s a closer look at both vulnerabilities.

The first critical vulnerability is (CVE-2019-1620), which has been dubbed the “Cisco Data Center Network Manager Arbitrary File Upload and Remote Code Execution Vulnerability.” Cisco explains the mechanics of the flaw, as well as what attackers can do with it, in the following advisory excerpt:

The vulnerability is due to incorrect permission settings in affected DCNM software. An attacker could exploit this vulnerability by uploading specially crafted data to the affected device. A successful exploit could allow the attacker to write arbitrary files on the filesystem and execute code with root privileges on the affected device.

The second severe flaw is (CVE-2019-1619) which, yet again, is given a verbose name. Entitled the “Cisco Data Center Network Manager Authentication Bypass Vulnerability,” the critical vulnerability is explained as follows:

The vulnerability is due to improper session management on affected DCNM software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to gain administrative access on the affected device.

One major point to note is that in the case of both vulnerabilities for the Data Center Network Manager, there are no workarounds that sysadmins can employ. The only way to end the possibility of a threat actor leveraging these flaws against your network is to patch. Especially now that the intricate details of the vulnerabilities are public knowledge, thanks to the security advisories, it is imperative to take care of this as soon as possible. The last thing you want is to be that person who is responsible for a security incident that was entirely preventable.

Featured image: Wikimedia/Lalantha123madushanka

Derek Kortepeter

Derek Kortepeter is a graduate of UCLA and tech journalist that is committed to creating an informed society with regards to Information Security. Kortepeter specializes in areas such as penetration testing, cryptography, cyber warfare, and governmental InfoSec policy.

Published by
Derek Kortepeter

Recent Posts

Amazon SES unveils new Bring Your Own IP feature

You’ve heard of Bring Your Own Device, and now there’s Bring Your Own IP. Here’s a look at this useful…

11 hours ago

Why API security is becoming the next big challenge

The shift to REST APIs has an unintended consequence for DevOps: new attack vectors. A security expert walks us through…

16 hours ago

Can ‘silent meetings’ solve your IT planning woes?

Companies are adopting the concept of silent meetings as a way to make business meetings more productive. Does this work?

19 hours ago

CES 2020: Latest innovations in laptops and smartphones

CES 2020 was more than just wild gadgets and crazy gizmos. There were some serious unveilings of new smartphones and…

1 day ago

WordPress vulnerability puts 300,000 at risk for attack

A WordPress vulnerability that could affect 300,000 users has been identified and patched. By if admins don’t update, they remain…

2 days ago

PowerShell jobs — because you have better things to do than wait

If you run PowerShell commands that take a while to complete, consider using PowerShell jobs, which will allow the command…

2 days ago