First published: Wed May 05 2021(Updated: )
A vulnerability in Cisco SD-WAN vManage Software could allow an unauthenticated, adjacent attacker to gain access to sensitive information. This vulnerability is due to improper access controls on API endpoints when Cisco SD-WAN vManage Software is running in multi-tenant mode. An attacker with access to a device that is managed in the multi-tenant environment could exploit this vulnerability by sending a request to an affected API endpoint on the vManage system. A successful exploit could allow the attacker to gain access to sensitive information that may include hashed credentials that could be used in future attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-9VZO4gfU
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco SA SD-WAN vManage 9VZO4gfU is high due to the potential for unauthorized access to sensitive information.
To fix Cisco SA SD-WAN vManage 9VZO4gfU, ensure that you apply the latest software updates that address the improper access controls.
Organizations using Cisco SD-WAN vManage Software in multi-tenant mode are affected by Cisco SA SD-WAN vManage 9VZO4gfU.
An unauthenticated, adjacent attacker can exploit Cisco SA SD-WAN vManage 9VZO4gfU to gain unauthorized access to sensitive data.
Cisco SA SD-WAN vManage 9VZO4gfU is caused by improper access controls on API endpoints within the software.