First published: Mon Nov 18 2024(Updated: )
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of an affected system. This vulnerability is due to insufficient access control for sensitive information that is written to an affected system. An attacker could exploit this vulnerability by accessing sensitive information that they are not authorized to access on an affected system. A successful exploit could allow the attacker to gain access to devices and other network management systems that they should not have access to.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-1232 is classified as medium, as it allows authenticated attackers to read arbitrary files on the filesystem.
To fix CVE-2021-1232, update to the latest version of Cisco SD-WAN vManage Software with the provided patches.
CVE-2021-1232 affects users of Cisco SD-WAN vManage Software, particularly those who have not implemented the necessary access controls.
Yes, CVE-2021-1232 can be exploited remotely by authenticated attackers.
An attacker exploiting CVE-2021-1232 could gain access to sensitive information stored in arbitrary files on the underlying filesystem.