cisco data-center-network-manager CVE-2020-3519 is a vulnerability in Cisco Data Center Network Manager
Published on August 26, 2020

Cisco Data Center Network Manager Path Traversal Vulnerability
A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.

Vendor Advisory NVD

Weakness Type

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2020-3519

Want to know whenever a new CVE is published for Cisco Data Center Network Manager? stack.watch will email you.

 

Affected Versions

Cisco Data Center Network Manager Version n/a is affected by CVE-2020-3519

Exploit Probability

EPSS
0.41%
Percentile
60.85%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.