Critical Vulnerabilities Found in Cisco Products

NJCCIC Advisory

Original Release Date: 7/30/2020

Summary

Cisco released advisories detailing critical vulnerabilities in two of their products. One is a vulnerability affecting Cisco Data Center Network Manager (DCNM) that could allow any internet user to bypass the web interface login and make actions as administrator of that device. The vulnerability, CVE-2020-3382, is found in the REST API of DCNM and exists due to different applications sharing a static encryption key. A second vulnerability, CVE-2020-3374, affects Cisco SD-WAN vManage software and could allow an internet user to gain privileges beyond what is normally allowed in the user authorization level. This vulnerability can be exploited by sending specially-crafted HTTP requests to the web-based management interface of the affected system. There are no workarounds available for these vulnerabilities.

Recommendations

The NJCCIC recommends administrators apply updates to patch these critical vulnerabilities and additional vulnerabilities after appropriate testing.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.