• About
  • Advertise
  • Careers
  • Contact
  • About
Wednesday, September 17, 2025
No Result
View All Result
NEWSLETTER
iotarizona
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
No Result
View All Result
iotarizona
No Result
View All Result
Home Tech

Cisco sounds warning on 3 critical security patches for DNA Center

in Tech
Cisco sounds warning on 3 critical security patches for DNA Center
0
SHARES
14
VIEWS
Share on FacebookShare on Twitter

Cisco issued three “critical” security warnings for its DNA Center users – two having a Common Vulnerability Scoring System rating of 9.8 out of 10.

The two worst problems involve Cisco Data Center Network Manager (DCNM). Cisco DNA Center controls access through policies using Software-Defined Access, automatically provision through Cisco DNA Automation, virtualize devices through Cisco Network Functions Virtualization (NFV), and lower security risks through segmentation and Encrypted Traffic Analysis.

In one advisory Cisco said a vulnerability in the web-based management interface of DCNM could let an attacker obtain a valid session cookie without knowing the administrative user password by sending a specially crafted HTTP request to a specific web servlet that is available on affected devices. The vulnerability is due to improper session management on affected DCNM software.

The vulnerability affects DCNM software releases prior to Release 11.1(1). Cisco said it removed the affected web servlet completely in DCNM Software Release 11.1(1).

Another critical warning was issued for DCNM on a vulnerability that lets an attacker create arbitrary files on the underlying DCNM filesystem by sending specially crafted data to a specific web servlet that is available on affected devices.

Cisco said the vulnerability is due to incorrect permission settings in affected DCNM software. A successful exploit could allow the attacker to write arbitrary files on the filesystem and execute code with root privileges on the affected device.

In DCNM Software Release 11.0(1) and earlier, an attacker would need to be authenticated to the DCNM web-based management interface to exploit this vulnerability, Cisco said.

The third vulnerability – with a CVSS score of 9.3 – defines a vulnerability in DNA Center that could let an unauthenticated, adjacent attacker bypass authentication and access critical internal services. An attacker could exploit this vulnerability by connecting an unauthorized network device to the subnet designated for cluster services. A successful exploit could allow an attacker to reach internal services that are not hardened for external access, Cisco said.

The vulnerability is due to insufficient access restriction to ports necessary for system operation, the company stated.

In this case Cisco said a workaround is available for customers who cannot upgrade to a fixed release. To coordinate implementation of the workaround, contact the Cisco Technical Assistance Center (TAC).

Cisco said it has released free software updates that address the vulnerabilities described in these advisories.

The critical warnings this week follow another critical DNA Center notice last week. Then Cisco detailed a critical warning – with a CVSS rating of 9.3 – about vulnerability in its DNA Center software that could let an unauthenticated attacker exploit this weakness by connecting an unauthorized network device to the subnet designated for cluster services.

A successful exploit could let an attacker reach internal services that are not hardened for external access, Cisco stated. The vulnerability is due to insufficient access restriction to ports necessary for system operation, and Cisco discovered the issue during internal security testing, the company stated.

This vulnerability affects Cisco DNA Center Software releases prior to 1.3, and it is fixed in version 1.3 and releases after that.

Cisco wrote that system updates are available for installation from the Cisco cloud and are not available for download from the Software Center on Cisco.com. To upgrade to a fixed release of Cisco DNA Center Software, administrators can use the System Updates feature of the software.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download Premium WordPress Themes Free
Download WordPress Themes Free
Download Nulled WordPress Themes
Download Best WordPress Themes Free Download
lynda course free download
download intex firmware
Premium WordPress Themes Download
online free course
Tags: Related: Security Data Center
ADVERTISEMENT
Next Post
Seagate, Cloudian partner for high-density storage as a service

Seagate, Cloudian partner for high-density storage as a service

Recommended

Hot products at VMworld 2018

Hot products at VMworld 2018

As work-at-home increases, so do attacks on VoIP and unified communications

As work-at-home increases, so do attacks on VoIP and unified communications

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Tech
  • Uncategorized
  • Wearables

About Us

Advance IOT information site of Arizona, USA.

© 2019-24 iotarizona.com.

No Result
View All Result
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars

© 2019-24 iotarizona.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In