cisco data-center-network-manager CVE-2020-3522 is a vulnerability in Cisco Data Center Network Manager
Published on August 26, 2020

Cisco Data Center Network Manager Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to bypass authorization on an affected device and access sensitive information that is related to the device. The vulnerability exists because the affected software allows users to access resources that are intended for administrators only. An attacker could exploit this vulnerability by submitting a crafted URL to an affected device. A successful exploit could allow the attacker to add, delete, and edit certain network configurations in the same manner as a user with administrative privileges.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2020-3522 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
LOW

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2020-3522 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2020-3522

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-3522 are published in Cisco Data Center Network Manager:

 

Affected Versions

Cisco Data Center Network Manager Version n/a is affected by CVE-2020-3522

Exploit Probability

EPSS
0.16%
Percentile
36.33%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.