CVE-2021-1272Server-Side Request Forgery in Cisco Data Center Network Manager

Severity
8.8HIGHNVD
EPSS
0.2%
top 58.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 20
Latest updateMay 24

Description

A vulnerability in the session validation feature of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. This vulnerability is due to insufficient validation of parameters in a specific HTTP request by an attacker. An attacker could exploit this vulnerability by sending a crafted HTTP request to an authenticated user of the DCNM web application. A successfu

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-qm5r-g6v2-jcgq: A vulnerability in the session validation feature of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypas2022-05-24
CVEList
Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability2021-01-20

📋Vendor Advisories

1
Cisco
Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability2021-01-20

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Multiple vulnerabilities in Advantech R-SeeNet2021-07-15
Talos
Vulnerability Spotlight: Multiple vulnerabilities in Advantech R-SeeNet2021-07-15
CVE-2021-1272 — Server-Side Request Forgery in Cisco | cvebase