Tuesday, April 15, 2025
HomeCisco11 Bugs in Cisco Data Center Network Manager Let Hackers Perform RCE,...

11 Bugs in Cisco Data Center Network Manager Let Hackers Perform RCE, SQL Injection, Authentication Bypass Attacks

Published on

SIEM as a Service

Follow Us on Google News

Cisco released a security update for several vulnerabilities that affected the Cisco products, including 3 critical remote code execution vulnerabilities that affected the Cisco Datacenter Network Manager let attackers take admin privilege remotely.

Out of 12 vulnerability, 3 marked as “Critical” severity, 7 bugs of categorized as “High” severity, and the rest of the 2 vulnerabilities listed under ” Medium” severity.

Cisco Data Center Network Manager (DCNM) is a network management solution for next-generation Data Centers, and the Cisco DCNM’s goal is to reduce Operation expenses by providing efficient operations and troubleshooting.

- Advertisement - Google News

Critical Severity Vulnerabilities

3 Critical vulnerabilities that exist in the authentication mechanisms of the Cisco Data Center Network Manager (DCNM) could allow unauthenticated and remote attackers to bypass the authentication of executing the arbitrary code in the affected system.

Vulnerabilities affect the earlier version of  Cisco DCNM software 11.3(1) for Microsoft Windows, Linux, and virtual appliance platforms.

All 3 vulnerabilities allow attackers to bypass the authentication of the following:

  • Cisco Data Center Network Manager REST API ( CVE ID: CVE-2019-15975 )
  • Cisco Data Center Network Manager SOAP API {CVE ID: CVE-2019-15976)
  • The web-based management interface of the Cisco DCNM (CVE ID: CVE-2019-15977)

High Severity Vulnerabilities

There are 7 high severity vulnerabilities addressed in this security update and it allows attackers to perform different attackers such as SQL injection, injecting malicious commands and directory traversal attacks.

2 SQL injection vulnerabilities that affected the Cisco Data Center Network Manager Let remote attackers execute arbitrary SQL commands on an affected device. 

Researchers discovered a 3 Cisco Data Center Network Manager Path Traversal Vulnerabilities that allow a remote attacker to conduct directory traversal attacks on an affected device with admin privilege.

2 Command injection vulnerabilities are uncovered in the REST and SOAP API endpoints of Cisco Data Center Network Manager that allows attackers to inject arbitrary commands on the underlying operating system (OS).

Cisco Vulnerabilities Details

Cisco Data Center Network Manager Authentication Bypass VulnerabilitiesCritical
Cisco Data Center Network Manager SQL Injection VulnerabilitiesHigh
Cisco Data Center Network Manager Path Traversal VulnerabilitiesHigh
Cisco Data Center Network Manager Command Injection VulnerabilitiesHigh
Cisco Data Center Network Manager XML External Entity Read Access VulnerabilityMedium
Cisco Data Center Network Manager JBoss EAP Unauthorized Access VulnerabilityMedium

Cisco advised the affected customers to apply these patches immediately to keep the network and application safe and secure from cyber attack.

Cisco has released updates to address this vulnerability; you can find the advisory here.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their...

CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers

A critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage...

Over 100,000 WordPress Plugin Vulnerability Exploited Just 4 Hours After Disclosure

Over 100,000 WordPress websites have been exposed to a critical security vulnerability, following the...

Hackers Use Microsoft Teams Chats to Deliver Malware to Windows PCs

A sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams chats to infiltrate Windows PCs...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers

A critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage...

Over 100,000 WordPress Plugin Vulnerability Exploited Just 4 Hours After Disclosure

Over 100,000 WordPress websites have been exposed to a critical security vulnerability, following the...

Apache Roller Vulnerability Allows Hackers to Bypass Access Controls

A newly disclosed vulnerability in Apache Roller, the popular open-source blog server, could allow...