First published: Wed Sep 22 2021(Updated: )
A vulnerability in the disaster recovery feature of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain unauthorized access to user credentials. This vulnerability exists because access to API endpoints is not properly restricted. An attacker could exploit this vulnerability by sending a request to an API endpoint. A successful exploit could allow the attacker to gain unauthorized access to administrative credentials that could be used in further attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-credentials-ydYfskzZ
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage | =20.6<20.6.1=20.5<20.5.2=20.4<20.4.2>=18.4 and earlier=19.2<=20.3<20.3.4 | 20.6.1 20.5.2 20.4.2 20.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sd-wan-credentials-ydYfskzZ is high due to the potential unauthorized access to user credentials.
To fix cisco-sa-sd-wan-credentials-ydYfskzZ, upgrade to a fixed version of Cisco SD-WAN vManage Software.
cisco-sa-sd-wan-credentials-ydYfskzZ is caused by insufficient restrictions on access to API endpoints.
cisco-sa-sd-wan-credentials-ydYfskzZ affects users of Cisco SD-WAN vManage Software versions 20.3.4 and earlier.
An authenticated, remote attacker can exploit cisco-sa-sd-wan-credentials-ydYfskzZ to gain unauthorized access.