Tuesday, March 4, 2025
HomeCiscoCisco Security Updates - Critical RCE vulnerability let Hackers Gain Control...

Cisco Security Updates – Critical RCE vulnerability let Hackers Gain Control Over Cisco Data Center Network Manager Remotely

Published on

SIEM as a Service

Follow Us on Google News

Cisco released security updates for Data Center Network Manager that allows an unauthenticated, remote attacker to upload arbitrary files on an affected device.

CVE-2019-1620 – File Upload & Remote Code Execution

The vulnerability resides in the web-based management interface of DCNM that allows an unauthenticated, remote attacker to upload arbitrary code on the affected device.

A remote attacker could exploit the vulnerability by uploading specially crafted data, and the vulnerability is due to incorrect permission settings.

Cisco has released updates to address this vulnerability; you can find the advisory here.

CVE-2019-1619 – Authentication Bypass Vulnerability

The vulnerability is due to improper session management; it allows a remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device.

Cisco has released updates to address this vulnerability; you can find the advisory here.

CVE-2019-1621 – Arbitrary File Download Vulnerability

The vulnerability resides in the web-based management interface of the Cisco Data Center Network Manager allows an attacker to gain access to sensitive files on an affected device.

Successful exploitation of the vulnerability allows an attacker to arbitrary files from the underlying filesystem of the affected device. The vulnerability is due to lack of permission settings.

Cisco has released updates to address this vulnerability; you can find the advisory here.

CVE-2019-1622 – Information Disclosure Vulnerability

A vulnerability in the web interface allows a remote attacker to retrieve sensitive information from an affected device. The vulnerability is due to lack of improper access controls for specific URLs on the affected device.

Cisco has released updates to address this vulnerability; you can find the advisory here.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Memory Corruption Flaw in macOS Let Hackers run Malicious Code with Root Privileges

macOS Zero-Day Vulnerability Allows Hackers to Bypass Security Protections With Synthetic Clicks

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...