Логотип exploitDog
bind:CVE-2021-1265
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-1265

Количество 3

Количество 3

nvd логотип

CVE-2021-1265

около 5 лет назад

A vulnerability in the configuration archive functionality of Cisco DNA Center could allow any privilege-level authenticated, remote attacker to obtain the full unmasked running configuration of managed devices. The vulnerability is due to the configuration archives files being stored in clear text, which can be retrieved by various API calls. An attacker could exploit this vulnerability by authenticating to the device and executing a series of API calls. A successful exploit could allow the attacker to retrieve the full unmasked running configurations of managed devices.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-32x3-2qh2-v3w9

больше 3 лет назад

A vulnerability in the configuration archive functionality of Cisco DNA Center could allow any privilege-level authenticated, remote attacker to obtain the full unmasked running configuration of managed devices. The vulnerability is due to the configuration archives files being stored in clear text, which can be retrieved by various API calls. An attacker could exploit this vulnerability by authenticating to the device and executing a series of API calls. A successful exploit could allow the attacker to retrieve the full unmasked running configurations of managed devices.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2021-00566

около 5 лет назад

Уязвимость функции архивирования центра управления сетью Cisco DNA Center, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-1265

A vulnerability in the configuration archive functionality of Cisco DNA Center could allow any privilege-level authenticated, remote attacker to obtain the full unmasked running configuration of managed devices. The vulnerability is due to the configuration archives files being stored in clear text, which can be retrieved by various API calls. An attacker could exploit this vulnerability by authenticating to the device and executing a series of API calls. A successful exploit could allow the attacker to retrieve the full unmasked running configurations of managed devices.

CVSS3: 6.5
0%
Низкий
около 5 лет назад
github логотип
GHSA-32x3-2qh2-v3w9

A vulnerability in the configuration archive functionality of Cisco DNA Center could allow any privilege-level authenticated, remote attacker to obtain the full unmasked running configuration of managed devices. The vulnerability is due to the configuration archives files being stored in clear text, which can be retrieved by various API calls. An attacker could exploit this vulnerability by authenticating to the device and executing a series of API calls. A successful exploit could allow the attacker to retrieve the full unmasked running configurations of managed devices.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-00566

Уязвимость функции архивирования центра управления сетью Cisco DNA Center, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.7
0%
Низкий
около 5 лет назад

Уязвимостей на страницу