First published: Fri Nov 15 2024(Updated: )
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain access to sensitive information on an affected system. This vulnerability is due to insufficient authorization checks. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to bypass authorization checking and gain access to sensitive information on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1482 has a high severity rating due to its potential to allow unauthorized access to sensitive information.
To fix CVE-2021-1482, update the Cisco SD-WAN vManage Software to the latest version provided by Cisco.
CVE-2021-1482 affects users of Cisco SD-WAN vManage Software that utilize the web-based management interface.
CVE-2021-1482 is an authorization bypass vulnerability that allows authenticated remote attackers to access restricted information.
Systems running an affected version of Cisco SD-WAN vManage Software are impacted by CVE-2021-1482.