A vulnerability in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to enumerate user accounts. This vulnerability is due to the improper handling of HTTP headers. An attacker could exploit this vulnerability by sending authenticated requests to an affected system. A successful exploit could allow the attacker to compare the HTTP responses that are returned by the affected system to determine which accounts are valid user accounts.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-enumeration-64eNnDKy - Vendor Advisory |
16 Oct 2023, 16:35
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco catalyst Sd-wan Manager
|
|
CPE | cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* |
Information
Published : 2021-05-06 13:15
Updated : 2024-11-21 05:44
NVD link : CVE-2021-1486
Mitre link : CVE-2021-1486
CVE.ORG link : CVE-2021-1486
JSON object : View
Products Affected
cisco
- sd-wan_vmanage
- catalyst_sd-wan_manager
CWE
CWE-203
Observable Discrepancy