First published: Wed Jul 21 2021(Updated: )
A vulnerability in the CLI interface of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to read arbitrary files on the underlying file system of an affected system. This vulnerability exists because access to sensitive information on an affected system is not sufficiently controlled. An attacker could exploit this vulnerability by gaining unauthorized access to sensitive information on an affected system. A successful exploit could allow the attacker to create forged authentication requests and gain unauthorized access to the web UI of an affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-infdis-LggOP9sE
Credit: by James Spadaro the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the cisco-sa-sdwan-vmanage-infdis-LggOP9sE vulnerability is significant due to its potential impact on sensitive information access.
To fix the cisco-sa-sdwan-vmanage-infdis-LggOP9sE vulnerability, ensure that you apply the recommended software updates provided by Cisco.
The cisco-sa-sdwan-vmanage-infdis-LggOP9sE vulnerability affects users of Cisco SD-WAN vManage Software.
An attacker exploiting the cisco-sa-sdwan-vmanage-infdis-LggOP9sE vulnerability could read arbitrary files on the affected system's file system.
The cisco-sa-sdwan-vmanage-infdis-LggOP9sE vulnerability involves an authenticated, local attacker.