First published: Wed May 05 2021(Updated: )
A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the Cisco SD-WAN vManage Software must be in cluster mode. This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to allow the attacker to view sensitive information on the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanageinfdis-LKrFpbv
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the vulnerability cisco-sa-sdwan-vmanageinfdis-LKrFpbv is classified as high.
To fix cisco-sa-sdwan-vmanageinfdis-LKrFpbv, update Cisco SD-WAN vManage Software to the latest patched version.
The vulnerability cisco-sa-sdwan-vmanageinfdis-LKrFpbv may expose sensitive information from the affected system.
An unauthenticated, remote attacker can potentially exploit the vulnerability cisco-sa-sdwan-vmanageinfdis-LKrFpbv.
The vulnerability cisco-sa-sdwan-vmanageinfdis-LKrFpbv affects Cisco SD-WAN vManage Software when it is running in cluster mode.