First published: Mon Nov 18 2024(Updated: )
A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the vManage software must be in cluster mode. This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to view sensitive information on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1234 is rated as high severity due to its potential to allow unauthorized access to sensitive information.
To address CVE-2021-1234, ensure your Cisco SD-WAN vManage Software is updated to the latest secure version that mitigates the vulnerability.
CVE-2021-1234 allows unauthenticated, remote attackers to view sensitive information on systems running the affected version of the software.
CVE-2021-1234 affects Cisco SD-WAN vManage Software specifically when it is operating in cluster mode.
No, CVE-2021-1234 can be exploited by unauthenticated remote attackers.