CWE
200
Advisory Published

cisco-sa-cpsc-info-disc-zkJBDJ9F: Cisco Prime Service Catalog Information Disclosure Vulnerability

First published: Wed Feb 02 2022(Updated: )

A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to improper enforcement of Administrator privilege levels for low-value sensitive data. An attacker with read-only Administrator access to the web-based management interface could exploit this vulnerability by sending a malicious HTTP request to the page that contains the sensitive data. A successful exploit could allow the attacker to collect sensitive information about users of the system and orders that have been placed using the application. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpsc-info-disc-zkJBDJ9F

Affected SoftwareAffected VersionHow to fix
Cisco Prime Service Catalog>=.1 patch v18<12<12.1 patch v18 (Feb 2022)
12.1 patch v18 (Feb 2022)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the vulnerability ID of the Cisco Prime Service Catalog information disclosure vulnerability?

    The vulnerability ID is cisco-sa-cpsc-info-disc-zkJBDJ9F.

  • What is the severity rating of the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability?

    The severity rating of the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability is medium (4.3).

  • How can an attacker exploit the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability?

    An attacker can exploit the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability by accessing sensitive information through the web-based management interface of Cisco Prime Service Catalog.

  • What can an attacker access if they successfully exploit the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability?

    If an attacker successfully exploits the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability, they can access sensitive information on the affected device.

  • How do I fix the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability?

    To fix the cisco-sa-cpsc-info-disc-zkJBDJ9F vulnerability, apply the 12.1 patch v18 (Feb 2022) for Cisco Prime Service Catalog.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203