Cisco NDFC Vulnerability Allows Low-Privileged Attackers to Access Sensitive Configuration Information
CVE-2024-20441

6.5MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
2 October 2024

Summary

A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device.

This vulnerability is due to insufficient authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to download config only or full backup files and learn sensitive configuration information. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface.

Affected Version(s)

Cisco Data Center Network Manager 12.1(1)

Cisco Data Center Network Manager 12.0.1a

Cisco Data Center Network Manager 12.0.2d

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.