First published: Wed Nov 18 2020(Updated: )
A vulnerability in the SOAP API of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to access and modify information on devices that belong to a different domain. The vulnerability is due to insufficient authorization in the SOAP API. An attacker could exploit this vulnerability by sending SOAP API requests to affected devices for devices that are outside their authorized domain. A successful exploit could allow the attacker to access and modify information on devices that belong to a different domain.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IoT Field Network Director | <4.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26072 is classified as a high severity vulnerability.
To fix CVE-2020-26072, upgrade Cisco IoT Field Network Director to version 4.6.1 or later.
CVE-2020-26072 affects users of Cisco IoT Field Network Director versions prior to 4.6.1.
CVE-2020-26072 allows an authenticated remote attacker to access and modify information on devices belonging to a different domain.
The vulnerability in CVE-2020-26072 is due to insufficient authorization in the SOAP API of Cisco IoT Field Network Director.