4
CVSSv2

CVE-2019-15999

Published: 06/01/2020 Updated: 22/10/2020
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.3 | Impact Score: 3.4 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

A vulnerability in the application environment of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote malicious user to gain unauthorized access to the JBoss Enterprise Application Platform (JBoss EAP) on an affected device. The vulnerability is due to an incorrect configuration of the authentication settings on the JBoss EAP. An attacker could exploit this vulnerability by authenticating with a specific low-privilege account. A successful exploit could allow the malicious user to gain unauthorized access to the JBoss EAP, which should be limited to internal system accounts.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco data center network manager

Vendor Advisories

A vulnerability in the application environment of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to gain unauthorized access to the JBoss Enterprise Application Platform (JBoss EAP) on an affected device The vulnerability is due to an incorrect configuration of the authentication settings on the JBoss EAP A ...

Exploits

Cisco DCNM JBoss version 104 suffers from a credential leakage vulnerability ...

Recent Articles

New year, new critical Cisco patches to install – this time for a dirty dozen of bugs that can be exploited to sidestep auth, inject commands, etc
The Register • Shaun Nichols in San Francisco • 03 Jan 2020

Data Center Network Manager bugapalooza with three must-fix flaws Cisco slips on a Tolkien ring: One chip design to rule them all, one design to find them. One design to bring them all...

Cisco is kicking off 2020 with the release of a crop of patches for its Data Center Network Manager. The updates address a total of 12 CVE-listed patches and range in severity from moderate to critical, though should all be patched regardless of rating. Nearly all were found within the REST and SOAP APIs. The immediate priority should be cleaning up CVE-201915975, CVE-201915976, and CVE-201915975, a trio of authentication bypass bugs that can be exploited remotely without authentication. The thr...