CVE-2018-0464
Summary
| CVE | CVE-2018-0464 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-10-05 16:29:00 UTC |
| Updated | 2019-10-09 23:32:00 UTC |
| Description | A vulnerability in Cisco Data Center Network Manager software could allow an authenticated, remote attacker to conduct directory traversal attacks and gain access to sensitive files on the targeted system. The vulnerability is due to improper validation of user requests within the management interface. An attacker could exploit this vulnerability by sending malicious requests containing directory traversal character sequences within the management interface. An exploit could allow the attacker to view or create arbitrary files on the targeted system. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Data Center Network Manager Lets Remote Authenticated Users Traverse the Directory to Create or View Files on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| Cisco Data Center Network Manager Path Traversal Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| [R2] Cisco Data Center Network Manager Authenticated Path Traversal - Research Advisory | Tenable® | MISC | www.tenable.com | Exploit, Third Party Advisory |
| Cisco Data Center Network Manager CVE-2018-0464 Directory Traversal Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.