A vulnerability in the implementation of the Cisco Network Plug-and-Play (PnP) agent of Cisco DNA Center could allow an authenticated, remote attacker to view sensitive information in clear text. The attacker must have valid low-privileged user credentials. This vulnerability is due to improper role-based access control (RBAC) with the integration of PnP. An attacker could exploit this vulnerability by authenticating to the device and sending a query to an internal API. A successful exploit could allow the attacker to view sensitive information in clear text, which could include configuration files.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-infodisc-pe7zAbdR | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Mar 2023, 19:26
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-312 | |
References | (CISCO) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-infodisc-pe7zAbdRÂ - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:* |
24 Mar 2023, 01:57
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-23 17:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-20059
Mitre link : CVE-2023-20059
CVE.ORG link : CVE-2023-20059
JSON object : View
Products Affected
cisco
- dna_center