Cisco SD-WAN vManage REST API Auth Bypass: Unauthorized Config Access
CVE-2023-20214 Published on August 3, 2023

A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to gain read permissions or limited write permissions to the configuration of an affected Cisco SD-WAN vManage instance. This vulnerability is due to insufficient request validation when using the REST API feature. An attacker could exploit this vulnerability by sending a crafted API request to an affected vManage instance. A successful exploit could allow the attacker to retrieve information from and send information to the configuration of the affected Cisco vManage instance. This vulnerability only affects the REST API and does not affect the web-based management interface or the CLI.

NVD

Vulnerability Analysis

CVE-2023-20214 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
NONE

Weakness Type

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2023-20214 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2023-20214

stack.watch emails you whenever new vulnerabilities are published in Cisco Sd Wan Vmanage or Cisco Catalyst Sd Wan Manager. Just hit a watch button to start following.

 
 

Affected Versions

Cisco SD-WAN vManage:

Exploit Probability

EPSS
0.15%
Percentile
35.30%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.