First published: Wed Feb 02 2022(Updated: )
A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper enforcement of Administrator privilege levels for low-value sensitive data. An attacker with read-only Administrator access to the web-based management interface could exploit this vulnerability by sending a malicious HTTP request to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information about users of the system and orders that have been placed using the application. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpsc-info-disc-zkJBDJ9F
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Service Catalog | >=.1 patch v18<12<12.1 patch v18 (Feb 2022) | 12.1 patch v18 (Feb 2022) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is cisco-sa-cpsc-info-disc-zkJBDJ9F.
The severity rating of the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability is medium (4.3).
An attacker can exploit the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability by accessing sensitive information through the web-based management interface of Cisco Prime Service Catalog.
If an attacker successfully exploits the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability, they can access sensitive information on the affected device.
To fix the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability, apply the 12.1 patch v18 (Feb 2022) for Cisco Prime Service Catalog.