First published: Wed Sep 27 2023(Updated: )
A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability requires the multi-tenant feature to be enabled. This vulnerability is due to insufficient user session management within the Cisco Catalyst SD-WAN Manager system. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain unauthorized access to information about another tenant, make configuration changes, or possibly take a tenant offline causing a denial of service condition.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage | <20.6.3.4 | |
Cisco SD-WAN vManage | >=20.7<20.9.3.2 | |
Cisco SD-WAN vManage | >=20.10<20.10.1.2 | |
Cisco SD-WAN vManage | >=20.11<20.11.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20254 is a vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature.
CVE-2023-20254 allows an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance.
CVE-2023-20254 has a severity rating of 8.8 (high).
CVE-2023-20254 affects Cisco SD-WAN Manager versions 20.6.3.4, 20.7, 20.9.3.2, 20.10, 20.10.1.2, 20.11, and 20.11.1.2.
To fix CVE-2023-20254, Cisco has released software updates. Please refer to the Cisco Security Advisory for more information.