PatchSiren cyber security CVE debrief
CVE-2015-0666 Cisco CVE debrief
CVE-2015-0666 affects Cisco Prime Data Center Network Manager (DCNM) and is described as a directory traversal vulnerability. It is listed in CISA’s Known Exploited Vulnerabilities catalog, which means defenders should treat it as an active risk and prioritize remediation. CISA’s entry directs organizations to apply updates per vendor instructions.
- Vendor
- Cisco
- Product
- Prime Data Center Network Manager (DCNM)
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-03-25
- Original CVE updated
- 2022-03-25
- Advisory published
- 2022-03-25
- Advisory updated
- 2022-03-25
Who should care
Organizations running Cisco Prime Data Center Network Manager (DCNM), especially teams responsible for vulnerability management, network management infrastructure, and patch deployment. Security teams should also care if DCNM is reachable from broad internal networks or the internet.
Technical summary
The supplied records identify the issue as a directory traversal vulnerability in Cisco Prime Data Center Network Manager (DCNM). Directory traversal flaws can let a user access paths outside the intended directory boundaries if the vulnerable component does not properly validate or normalize file paths. CISA has placed this CVE in the KEV catalog and specifies remediation by applying vendor updates.
Defensive priority
Urgent
Recommended defensive actions
- Confirm whether Cisco Prime Data Center Network Manager (DCNM) is deployed anywhere in the environment.
- Apply Cisco vendor updates and follow the vendor instructions referenced by CISA.
- Prioritize remediation for any DCNM instance that is widely reachable or operationally sensitive.
- Restrict access to DCNM to only required administrative networks until remediation is complete.
- Review DCNM-related logs and access activity for signs of suspicious file-path or directory traversal behavior.
- Update asset inventories and vulnerability management records to verify the affected product is tracked and remediated.
Evidence notes
The source corpus identifies the vulnerability as a Cisco Prime DCNM directory traversal issue and places it in CISA’s Known Exploited Vulnerabilities catalog. CISA’s KEV metadata says the required action is to apply updates per vendor instructions. No CVSS score or severity was provided in the supplied record.
Official resources
-
CVE-2015-0666 CVE record
CVE.org
-
CVE-2015-0666 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
CISA added CVE-2015-0666 to the Known Exploited Vulnerabilities catalog on 2022-03-25 and set a due date of 2022-04-15 for applying updates per vendor instructions. The supplied record does not include a CVSS score or other severity metric.