First published: Wed Jun 07 2023(Updated: )
A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials.This
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-csw-auth-openapi-kTndjdNX vulnerability is classified as a critical security issue.
To fix cisco-sa-csw-auth-openapi-kTndjdNX, update Cisco Secure Workload to the latest version provided by Cisco.
An attacker exploiting cisco-sa-csw-auth-openapi-kTndjdNX can execute operations requiring Administrator privileges, leading to unauthorized access and potential data breaches.
Users of Cisco Secure Workload with read-only user privileges are affected by cisco-sa-csw-auth-openapi-kTndjdNX.
Yes, valid user credentials are required to exploit the cisco-sa-csw-auth-openapi-kTndjdNX vulnerability.