First published: Thu Nov 04 2021(Updated: )
A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to a specific API request. An attacker could exploit the vulnerability by sending a crafted HTTP request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the users of the application, including security questions and answers. To exploit this vulnerability an attacker would need valid Administrator credentials. Cisco expects to release software updates that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Common Services Platform Collector | <=2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Common Services Platform Collector vulnerability is CVE-2021-34774.
The severity of CVE-2021-34774 is medium (4.9).
This vulnerability allows an authenticated, remote attacker to access sensitive data on the affected system.
The affected software for CVE-2021-34774 is Cisco Common Services Platform Collector version up to and inclusive of 2.10.
Yes, Cisco has provided a fix for this vulnerability. Please refer to the Cisco Security Advisory for more information.