First published: Thu Feb 10 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper enforcement of Administrator privilege levels for low-value sensitive data. An attacker with read-only Administrator access to the web-based management interface could exploit this vulnerability by sending a malicious HTTP request to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information about users of the system and orders that have been placed using the application.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Service Catalog | <=12.0 | |
Cisco Prime Service Catalog | =12.1 | |
Cisco Prime Service Catalog | =12.1-patch10 | |
Cisco Prime Service Catalog | =12.1-patch11 | |
Cisco Prime Service Catalog | =12.1-patch12 | |
Cisco Prime Service Catalog | =12.1-patch13 | |
Cisco Prime Service Catalog | =12.1-patch14 | |
Cisco Prime Service Catalog | =12.1-patch15 | |
Cisco Prime Service Catalog | =12.1-patch16 | |
Cisco Prime Service Catalog | =12.1-patch17 | |
Cisco Prime Service Catalog | =12.1-patch2 | |
Cisco Prime Service Catalog | =12.1-patch3 | |
Cisco Prime Service Catalog | =12.1-patch4 | |
Cisco Prime Service Catalog | =12.1-patch6 | |
Cisco Prime Service Catalog | =12.1-patch7 | |
Cisco Prime Service Catalog | =12.1-patch8 | |
Cisco Prime Service Catalog | =12.1-patch9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-20680.
The severity level of CVE-2022-20680 is medium.
The vulnerability in Cisco Prime Service Catalog occurs due to improper enforcement of Administrator privilege levels for low-value sensitive data.
The affected software is Cisco Prime Service Catalog versions up to and including 12.0, version 12.1, and patches 12.1-patch2 to 12.1-patch17.
An attacker can exploit CVE-2022-20680 by remotely accessing the web-based management interface of an affected device.