First published: Wed Jul 12 2023(Updated: )
A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to gain read permissions or limited write permissions to the configuration of an affected Cisco SD-WAN vManage instance.This
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN Solution Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-vmanage-unauthapi-sphCLYPA is considered critical due to the potential for unauthenticated remote access to sensitive configurations.
To fix cisco-sa-vmanage-unauthapi-sphCLYPA, update your Cisco SD-WAN vManage software to the latest patched version provided by Cisco.
Organizations using Cisco SD-WAN vManage software versions prior to the release that mitigates the vulnerability are affected by cisco-sa-vmanage-unauthapi-sphCLYPA.
An attacker can gain read permissions and limited write permissions to the configuration of an affected Cisco SD-WAN vManage instance.
There are no effective workarounds for cisco-sa-vmanage-unauthapi-sphCLYPA; the recommended action is to apply the software update.