First published: Wed May 05 2021(Updated: )
A vulnerability in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to enumerate user accounts. This vulnerability is due to the improper handling of HTTP headers. An attacker could exploit this vulnerability by sending authenticated requests to an affected system. A successful exploit could allow the attacker to compare the HTTP responses that are returned by the affected system to determine which accounts are valid user accounts. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-enumeration-64eNnDKy
Credit: Nelson Black Lantern Security
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-vmanage-enumeration-64eNnDKy is considered high due to the potential for user account enumeration.
To fix cisco-sa-vmanage-enumeration-64eNnDKy, ensure that you apply the recommended patches and updates provided by Cisco.
Cisco SD-WAN vManage Software installations are affected by the cisco-sa-vmanage-enumeration-64eNnDKy vulnerability.
An attacker could potentially enumerate user accounts in systems affected by cisco-sa-vmanage-enumeration-64eNnDKy.
cisco-sa-vmanage-enumeration-64eNnDKy was disclosed in the Cisco Security Advisory.