First published: Thu May 06 2021(Updated: )
A vulnerability in an API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the application web-based interface. This vulnerability exists because the API does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending malicious input to the API. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based interface or access sensitive, browser-based information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage | <20.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1507.
The severity of CVE-2021-1507 is medium with a CVSS score of 5.4.
The affected software is Cisco SD-WAN vManage version up to 20.5.1.
An authenticated remote attacker can exploit this vulnerability to conduct a stored cross-site scripting (XSS) attack against users of the application web-based interface.
Yes, Cisco has provided a fix for this vulnerability. Please refer to the Cisco Security Advisory for more details.