Authentication Vulnerability in Cisco SD-WAN vManage REST API
CVE-2023-20214
9.1CRITICAL
Summary
A security flaw exists in the request authentication validation for the REST API of Cisco SD-WAN vManage software, enabling an unauthenticated remote attacker to access configuration information. This vulnerability arises from inadequate request validation mechanisms in the REST API feature. An attacker might exploit this flaw by sending specially crafted API requests to gain unauthorized read access or limited write permissions to the configurations. It is important to note that the vulnerability is confined to the REST API and does not impact the web-based management interface or command-line interface (CLI).
Affected Version(s)
Cisco SD-WAN vManage 20.6.4
Cisco SD-WAN vManage 20.6.5
Cisco SD-WAN vManage 20.6.5.1
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved