CVE-2023-20059
23.03.2023, 17:15
A vulnerability in the implementation of the Cisco Network Plug-and-Play (PnP) agent of Cisco DNA Center could allow an authenticated, remote attacker to view sensitive information in clear text. The attacker must have valid low-privileged user credentials. This vulnerability is due to improper role-based access control (RBAC) with the integration of PnP. An attacker could exploit this vulnerability by authenticating to the device and sending a query to an internal API. A successful exploit could allow the attacker to view sensitive information in clear text, which could include configuration files.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | dna_center | 𝑥 < 2.3.3.7 |
cisco | dna_center | 2.3.4.0 ≤ 𝑥 < 2.3.5.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-555 - J2EE Misconfiguration: Plaintext Password in Configuration FileThe J2EE application stores a plaintext password in a configuration file.
- CWE-312 - Cleartext Storage of Sensitive InformationThe product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.