First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization and modify the configuration of an affected system, gain access to sensitive information, and view information that they are not authorized to access. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS
Credit: These vulnerabilities were found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | =20.4<20.4.1>=19.3=20.1<=20.3<20.3.2>=.3<18=18.3=18.4<=19.2<19.2.4 | 20.4.1 20.3.2 19.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
It is a vulnerability in the web-based management interface of Cisco SD-WAN vManage Software that allows an attacker to bypass authorization and modify the system's configuration, gain access to sensitive information, and view unauthorized information.
An authenticated, remote attacker can exploit this vulnerability by bypassing authorization in the web-based management interface of Cisco SD-WAN vManage Software.
The severity of this vulnerability is rated as high with a CVSS score of 8.8.
The affected versions of Cisco SD-WAN vManage Software are 20.4.1, 20.3.2, and 19.2.4.
To fix this vulnerability, it is recommended to upgrade Cisco SD-WAN vManage Software to a version that has the necessary security patches.