Session Management Vulnerability in Cisco Catalyst SD-WAN Manager
CVE-2023-20254
7.2HIGH
Summary
A security flaw exists in the session management system of the Cisco Catalyst SD-WAN Manager's multi-tenant feature. An authenticated attacker, leveraging this vulnerability, could exploit insufficient user session management to gain unauthorized access to another tenant managed by the same Cisco Catalyst SD-WAN Manager instance. By sending specially crafted requests to the affected system, the attacker might obtain sensitive information, implement unauthorized configuration changes, or lead to potential service disruptions, thereby impacting tenant operations.
Affected Version(s)
Cisco SD-WAN vManage 17.2.6
Cisco SD-WAN vManage 17.2.7
Cisco SD-WAN vManage 17.2.8
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved