// For flags

CVE-2021-1283

Cisco Data Center Network Manager Information Disclosure Vulnerability

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the logging subsystem of Cisco Data Center Network Manager (DCNM) could allow an authenticated, local attacker to view sensitive information in a system log file that should be restricted. The vulnerability exists because sensitive information is not properly masked before it is written to system log files. An attacker could exploit this vulnerability by authenticating to an affected device and inspecting a specific system log file. A successful exploit could allow the attacker to view sensitive information in the system log file. To exploit this vulnerability, the attacker would need to have valid user credentials.

Una vulnerabilidad en el subsistema de registro de Cisco Data Center Network Manager (DCNM), podría permitir a un atacante local autenticado visualizar información confidencial en un archivo de registro del sistema que debería estar restringido. La vulnerabilidad se presenta porque la información confidencial no se enmascara apropiadamente antes de que se escriba en los archivos de registro del sistema. Un atacante podría explotar esta vulnerabilidad si se autentica en un dispositivo afectado e inspecciona un archivo de registro del sistema específico. Una explotación con éxito podría permitir al atacante visualizar información confidencial en el archivo de registro del sistema. Para explotar esta vulnerabilidad, el atacante debería tener credenciales de usuario válidas

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-11-13 CVE Reserved
  • 2021-01-20 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-789: Memory Allocation with Excessive Size Value
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Data Center Network Manager
Search vendor "Cisco" for product "Data Center Network Manager"
< 11.5\(1\)
Search vendor "Cisco" for product "Data Center Network Manager" and version " < 11.5\(1\)"
-
Affected