9.8
CVSSv3

CVE-2018-15386

Published: 05/10/2018 Updated: 13/08/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote malicious user to bypass authentication and have direct unauthorized access to critical management functions. The vulnerability is due to an insecure default configuration of the affected system. An attacker could exploit this vulnerability by directly connecting to the exposed services. An exploit could allow the malicious user to retrieve and modify critical system files.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco digital network architecture center 1.1

cisco digital network architecture center 1.1.1

cisco digital network architecture center 1.1.2

cisco digital network architecture center 1.1.3

Vendor Advisories

A vulnerability in Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and have direct unauthorized access to critical management functions The vulnerability is due to an insecure default configuration of the affected system An attacker could exploit this vulnerability by direc ...

Recent Articles

The weekend starts here... right after you've installed these critical Cisco bug patches
The Register • Richard Chirgwin • 05 Oct 2018

Coding screwups for Prime Infrastructure and DNA Center admins to slurp up

Cisco admins, maybe you'd like to clear your Friday, because there's a fresh batch of critical-rated vulnerabilities to assess and patch as needed. The three worst bugs lie in Cisco's Prime Infrastructure and Digital Network Architecture (DNA) Center products, and are among 26 bugs disclosed this week. One of the critical-rated programming cockups is a permission error that can be exploited to perform arbitrary file upload. An attacker could send a file using TFTP, allowing the miscreant to run ...