Cisco SD-WAN vManage Authenticated File Read via Web UI
CVE-2021-1232 Published on November 18, 2024
Cisco SD-WAN vManage Information Disclosure Vulnerability
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of an affected system.
This vulnerability is due to insufficient access control for sensitive information that is written to an affected system. An attacker could exploit this vulnerability by accessing sensitive information that they are not authorized to access on an affected system. A successful exploit could allow the attacker to gain access to devices and other network management systems that they should not have access to.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Vulnerability Analysis
CVE-2021-1232 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Products Associated with CVE-2021-1232
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-1232 are published in these products:
Affected Versions
Cisco Catalyst SD-WAN Manager:- Version 20.1.12 is affected.
- Version 19.2.1 is affected.
- Version 18.4.4 is affected.
- Version 18.4.5 is affected.
- Version 20.1.1.1 is affected.
- Version 20.1.1 is affected.
- Version 19.3.0 is affected.
- Version 19.2.2 is affected.
- Version 19.2.099 is affected.
- Version 18.3.6 is affected.
- Version 18.3.7 is affected.
- Version 19.2.0 is affected.
- Version 18.3.8 is affected.
- Version 19.0.0 is affected.
- Version 19.1.0 is affected.
- Version 18.4.302 is affected.
- Version 18.4.303 is affected.
- Version 19.2.097 is affected.
- Version 19.2.098 is affected.
- Version 17.2.10 is affected.
- Version 18.3.6.1 is affected.
- Version 19.0.1a is affected.
- Version 18.2.0 is affected.
- Version 18.4.3 is affected.
- Version 18.4.1 is affected.
- Version 17.2.8 is affected.
- Version 18.3.3.1 is affected.
- Version 18.4.0 is affected.
- Version 18.3.1 is affected.
- Version 17.2.6 is affected.
- Version 17.2.9 is affected.
- Version 18.3.4 is affected.
- Version 17.2.5 is affected.
- Version 18.3.1.1 is affected.
- Version 18.3.5 is affected.
- Version 18.4.0.1 is affected.
- Version 18.3.3 is affected.
- Version 17.2.7 is affected.
- Version 17.2.4 is affected.
- Version 18.3.0 is affected.
- Version 19.2.3 is affected.
- Version 18.4.501_ES is affected.
- Version 20.3.1 is affected.
- Version 20.1.2 is affected.
- Version 19.2.929 is affected.
- Version 19.2.31 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.