ID

VAR-202101-1021


CVE

CVE-2021-1249


TITLE

Cisco Data Center Network Manager  Cross-site Scripting Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-002628

DESCRIPTION

Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow a remote attacker with network-operator privileges to conduct a cross-site scripting (XSS) attack or a reflected file download (RFD) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Data Center Network Manager (DCNM) Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. The system is available for Cisco Nexus and MDS series switches and provides storage visualization, configuration and troubleshooting functions

Trust: 1.8

sources: NVD: CVE-2021-1249 // JVNDB: JVNDB-2021-002628 // VULHUB: VHN-374303 // VULMON: CVE-2021-1249

AFFECTED PRODUCTS

vendor:ciscomodel:data center network managerscope:ltversion:11.5\(1\)

Trust: 1.0

vendor:シスコシステムズmodel:cisco data center network managerscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-002628 // NVD: CVE-2021-1249

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1249
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1249
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-1249
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202101-1510
value: MEDIUM

Trust: 0.6

VULHUB: VHN-374303
value: LOW

Trust: 0.1

VULMON: CVE-2021-1249
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-1249
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-374303
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1249
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 2.7
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1249
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.3
impactScore: 3.7
version: 3.1

Trust: 1.0

NVD: CVE-2021-1249
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-374303 // VULMON: CVE-2021-1249 // JVNDB: JVNDB-2021-002628 // CNNVD: CNNVD-202101-1510 // NVD: CVE-2021-1249 // NVD: CVE-2021-1249

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-79

Trust: 1.0

problemtype:Cross-site scripting (CWE-79) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-374303 // JVNDB: JVNDB-2021-002628 // NVD: CVE-2021-1249

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202101-1510

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202101-1510

PATCH

title:cisco-sa-dcnm-xss-vulns-GuUJ39ghurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh

Trust: 0.8

title:Cisco Data Center Network Manager Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139774

Trust: 0.6

title:Cisco: Cisco Data Center Network Manager Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-dcnm-xss-vulns-GuUJ39gh

Trust: 0.1

sources: VULMON: CVE-2021-1249 // JVNDB: JVNDB-2021-002628 // CNNVD: CNNVD-202101-1510

EXTERNAL IDS

db:NVDid:CVE-2021-1249

Trust: 2.6

db:JVNDBid:JVNDB-2021-002628

Trust: 0.8

db:AUSCERTid:ESB-2021.0246

Trust: 0.6

db:CNNVDid:CNNVD-202101-1510

Trust: 0.6

db:VULHUBid:VHN-374303

Trust: 0.1

db:VULMONid:CVE-2021-1249

Trust: 0.1

sources: VULHUB: VHN-374303 // VULMON: CVE-2021-1249 // JVNDB: JVNDB-2021-002628 // CNNVD: CNNVD-202101-1510 // NVD: CVE-2021-1249

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-dcnm-xss-vulns-guuj39gh

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-1249

Trust: 1.4

url:https://www.auscert.org.au/bulletins/esb-2021.0246/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-data-center-network-manager-cross-site-scripting-via-network-operator-34390

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-374303 // VULMON: CVE-2021-1249 // JVNDB: JVNDB-2021-002628 // CNNVD: CNNVD-202101-1510 // NVD: CVE-2021-1249

SOURCES

db:VULHUBid:VHN-374303
db:VULMONid:CVE-2021-1249
db:JVNDBid:JVNDB-2021-002628
db:CNNVDid:CNNVD-202101-1510
db:NVDid:CVE-2021-1249

LAST UPDATE DATE

2024-08-14T13:54:17.453000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-374303date:2022-08-05T00:00:00
db:VULMONid:CVE-2021-1249date:2021-01-27T00:00:00
db:JVNDBid:JVNDB-2021-002628date:2021-09-27T09:06:00
db:CNNVDid:CNNVD-202101-1510date:2022-08-08T00:00:00
db:NVDid:CVE-2021-1249date:2023-11-07T03:27:47.750

SOURCES RELEASE DATE

db:VULHUBid:VHN-374303date:2021-01-20T00:00:00
db:VULMONid:CVE-2021-1249date:2021-01-20T00:00:00
db:JVNDBid:JVNDB-2021-002628date:2021-09-27T00:00:00
db:CNNVDid:CNNVD-202101-1510date:2021-01-20T00:00:00
db:NVDid:CVE-2021-1249date:2021-01-20T21:15:12.317