Security Experts:

Connect with us

Hi, what are you looking for?


Cloud Security

Critical Flaws Found in Cisco Data Center Network Manager

Cisco on Wednesday informed customers that its Data Center Network Manager (DCNM) product is affected by several vulnerabilities, including ones described as “critical” and “high severity.”

Cisco on Wednesday informed customers that its Data Center Network Manager (DCNM) product is affected by several vulnerabilities, including ones described as “critical” and “high severity.”

According to Cisco, the web-based interface of the DCNM data center network management platform is affected by two critical security holes. One of them, tracked as CVE-2019-1620, allows a remote, unauthenticated attacker to upload arbitrary files to the impacted device and execute code with root privileges.

The second critical flaw, identified as CVE-2019-1619, can be exploited by a remote attacker to bypass authentication and perform arbitrary activities on the impacted device with admin privileges. Exploitation of this vulnerability involves sending a specially crafted HTTP request to the affected device.

Another potentially serious vulnerability identified in DCNM is CVE-2019-1621, which allows a remote attacker to gain access to sensitive files and download them. Launching an attack involves requesting specific URLs, with no authentication being required.

Finally, Cisco has learned that DCNM is affected by an information disclosure issue that can be exploited remotely without authentication to obtain log files and diagnostic information from the targeted device. This security hole has been assigned a “medium severity” rating.

The three more serious flaws have been fixed with software updates, but no patches or workarounds appear to be available for the medium-severity issue.

All of these vulnerabilities were reported to Cisco by researcher Pedro Ribeiro through the iDefense Vulnerability Contributor Program and there is no indication that any of them have been exploited for malicious purposes.

Related: Several Vulnerabilities Found in Cisco Industrial Network Director

Related: Default Account in Cisco CSPC Allows Unauthorized Access

Related: Cisco Patches Critical Vulnerability in Data Center Switches

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet