First published: Thu May 06 2021(Updated: )
A vulnerability in Cisco SD-WAN vManage Software could allow an unauthenticated, adjacent attacker to gain access to sensitive information. This vulnerability is due to improper access controls on API endpoints when Cisco SD-WAN vManage Software is running in multi-tenant mode. An attacker with access to a device that is managed in the multi-tenant environment could exploit this vulnerability by sending a request to an affected API endpoint on the vManage system. A successful exploit could allow the attacker to gain access to sensitive information that may include hashed credentials that could be used in future attacks.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN Solution | <20.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-1515.
The severity of CVE-2021-1515 is medium with a CVSS base score of 4.3.
The vulnerability in Cisco SD-WAN vManage Software occurs due to improper access controls on API endpoints when running in multi-tenant mode.
An unauthenticated, adjacent attacker can exploit this vulnerability.
To fix CVE-2021-1515, it is recommended to upgrade to a version of Cisco SD-WAN vManage Software that is not affected by this vulnerability.