A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-infodis-73sHJNEq | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Oct 2023, 16:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7:*:*:*:*:*:*:* | |
First Time |
Cisco catalyst Sd-wan Manager
|
Information
Published : 2022-04-15 15:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-20747
Mitre link : CVE-2022-20747
CVE.ORG link : CVE-2022-20747
JSON object : View
Products Affected
cisco
- sd-wan_vmanage
- catalyst_sd-wan_manager
CWE