This week, Cisco patched two critical security vulnerabilities in the Digital Network Architecture Center. The patches come alongside massive updates for 36 different medium severity to critical vulnerabilities in various products in the same day.
Critical Vulnerabilities Discovered In Cisco Digital Network Architecture Center
As disclosed, Cisco Digital Network Architecture Center (DNA) has two critical vulnerabilities that could allow an attacker to bypass authentication and access management functions. Both vulnerabilities were different in nature but had a similar impact allowing remote attacks.
The first vulnerability affecting the Cisco DNA Center involves authentication bypass. Exploiting this flaw could let an attacker to remotely control the identity management functions by simply bypassing the authentication. As stated in their security advisory,
“The vulnerability is due to insufficient security restrictions for critical management functions. An attacker could exploit this vulnerability by sending a valid identity management request to the affected system. An exploit could allow the attacker to view and make unauthorized modifications to existing system users as well as create new users.”
This DNA Authentication Bypass vulnerability (CVE-2018-0448) has achieved a critical severity level with a CVSS base score of 9.8. The versions affected by this flaw include Cisco DNA Center Software Release 1.1.4 and earlier.
The second flaw is a DNA Unauthenticated Access Vulnerability (CVE-2018-15386) that has achieved a CVSS base score of 9.8. The flaw could allow an attacker to remotely access the critical management functions after an authentication bypass. Explaining this vulnerability, Cisco stated in their advisory,
“The vulnerability is due to an insecure default configuration of the affected system. An attacker could exploit this vulnerability by directly connecting to the exposed services. An exploit could allow the attacker to retrieve and modify critical system files.”
This vulnerability reportedly affected the Cisco DNA Center Release 1.1.
Cisco Patched The Flaws
Cisco discovered both the vulnerabilities during internal security testing. They further confirm no malicious exploitation of this vulnerability before their discovery. The vendors quickly patched the flaws in the newer Cisco DNA Center Software versions. For CVE-2018-0448, the software Releases 1.1.4 and later carry the patch. Whereas, the Cisco DNA Center Release 1.2 and later fix the flaw CVE-2018-15386.
Take your time to comment on this article.
Latest posts by Abeerah Hashim (see all)
- Spectra Attack Target Separation Between Wireless Communication Chips For Coordinated Attacks - May 27, 2020
- Signal Hints About Ditching Phone Numbers As User ID As It Introduces Signal PINs - May 26, 2020
- New Unc0ver iOS Jailbreak Works For All Latest iOS Versions Due To Zero-Day Bug - May 26, 2020