Vulnerability Details CVE-2020-3521
A vulnerability in a specific REST API of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with a low-privileged account could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to read arbitrary files on the affected system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 43.5%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 4.0
Products affected by CVE-2020-3521
-
cpe:2.3:a:cisco:data_center_network_manager:-
-
cpe:2.3:a:cisco:data_center_network_manager:10.0
-
cpe:2.3:a:cisco:data_center_network_manager:10.1
-
cpe:2.3:a:cisco:data_center_network_manager:10.2(1)
-
cpe:2.3:a:cisco:data_center_network_manager:10.3(1)
-
cpe:2.3:a:cisco:data_center_network_manager:10.3(1)s3
-
cpe:2.3:a:cisco:data_center_network_manager:10.4(1)
-
cpe:2.3:a:cisco:data_center_network_manager:10.4(1.128)
-
cpe:2.3:a:cisco:data_center_network_manager:10.4(2)
-
cpe:2.3:a:cisco:data_center_network_manager:11.0(1)
-
cpe:2.3:a:cisco:data_center_network_manager:11.1(1)
-
cpe:2.3:a:cisco:data_center_network_manager:11.2(1)
-
cpe:2.3:a:cisco:data_center_network_manager:11.3(1)
-
cpe:2.3:a:cisco:data_center_network_manager:4.0
-
cpe:2.3:a:cisco:data_center_network_manager:4.1
-
cpe:2.3:a:cisco:data_center_network_manager:4.2
-
cpe:2.3:a:cisco:data_center_network_manager:5.0
-
cpe:2.3:a:cisco:data_center_network_manager:5.2(1)