First published: Fri Nov 15 2024(Updated: )
A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. This vulnerability is due to improper handling of XML External Entity (XXE) entries when the affected software parses certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1483 has been rated as high severity due to its potential to allow authenticated remote attackers to access sensitive information.
To remediate CVE-2021-1483, update the Cisco SD-WAN vManage Software to the latest version that addresses this vulnerability.
CVE-2021-1483 affects the Cisco SD-WAN vManage Software, allowing vulnerabilities to compromise its web UI.
Yes, CVE-2021-1483 can be exploited by an authenticated remote attacker due to improper handling of XML External Entity entries.
The impact of CVE-2021-1483 includes the potential for unauthorized read and write access to sensitive information on affected systems.