First published: Wed Sep 11 2024(Updated: )
A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Crosswork Network Services Orchestrator | ||
Cisco ConfD | ||
Cisco Optical Site Manager | ||
Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-nso-auth-bypass-QnTEesp is categorized as high.
To fix cisco-sa-nso-auth-bypass-QnTEesp, apply the latest security patch released by Cisco for affected products.
Cisco Crosswork Network Services Orchestrator, Cisco ConfD, Cisco Optical Site Manager, and Cisco RV340 Dual WAN Gigabit VPN Router users are affected by cisco-sa-nso-auth-bypass-QnTEesp.
cisco-sa-nso-auth-bypass-QnTEesp addresses an authenticated remote attack exploit via the JSON-RPC API.
There are no official workarounds for cisco-sa-nso-auth-bypass-QnTEesp; updating to the latest version is recommended.