A vulnerability in Cisco SD-WAN vManage Software could allow an unauthenticated, adjacent attacker to gain access to sensitive information. This vulnerability is due to improper access controls on API endpoints when Cisco SD-WAN vManage Software is running in multi-tenant mode. An attacker with access to a device that is managed in the multi-tenant environment could exploit this vulnerability by sending a request to an affected API endpoint on the vManage system. A successful exploit could allow the attacker to gain access to sensitive information that may include hashed credentials that could be used in future attacks.
References
Configurations
History
21 Nov 2024, 05:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-9VZO4gfU - Vendor Advisory |
Information
Published : 2021-05-06 13:15
Updated : 2024-11-21 05:44
NVD link : CVE-2021-1515
Mitre link : CVE-2021-1515
CVE.ORG link : CVE-2021-1515
JSON object : View
Products Affected
cisco
- sd-wan_vmanage
CWE