5.3

CVE-2021-1234

A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the vManage software must be in cluster mode.
This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to view sensitive information on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoCatalyst Sd-wan Manager Version17.2.4
CiscoCatalyst Sd-wan Manager Version17.2.5
CiscoCatalyst Sd-wan Manager Version17.2.6
CiscoCatalyst Sd-wan Manager Version17.2.7
CiscoCatalyst Sd-wan Manager Version17.2.8
CiscoCatalyst Sd-wan Manager Version17.2.9
CiscoCatalyst Sd-wan Manager Version17.2.10
CiscoCatalyst Sd-wan Manager Version18.2.0
CiscoCatalyst Sd-wan Manager Version18.3.0
CiscoCatalyst Sd-wan Manager Version18.3.1
CiscoCatalyst Sd-wan Manager Version18.3.1.1
CiscoCatalyst Sd-wan Manager Version18.3.3
CiscoCatalyst Sd-wan Manager Version18.3.3.1
CiscoCatalyst Sd-wan Manager Version18.3.4
CiscoCatalyst Sd-wan Manager Version18.3.5
CiscoCatalyst Sd-wan Manager Version18.3.6
CiscoCatalyst Sd-wan Manager Version18.3.6.1
CiscoCatalyst Sd-wan Manager Version18.3.7
CiscoCatalyst Sd-wan Manager Version18.3.8
CiscoCatalyst Sd-wan Manager Version18.4.0
CiscoCatalyst Sd-wan Manager Version18.4.0.1
CiscoCatalyst Sd-wan Manager Version18.4.1
CiscoCatalyst Sd-wan Manager Version18.4.3
CiscoCatalyst Sd-wan Manager Version18.4.4
CiscoCatalyst Sd-wan Manager Version18.4.5
CiscoCatalyst Sd-wan Manager Version18.4.6
CiscoCatalyst Sd-wan Manager Version18.4.302
CiscoCatalyst Sd-wan Manager Version18.4.303
CiscoCatalyst Sd-wan Manager Version18.4.501_es
CiscoCatalyst Sd-wan Manager Version19.0.0
CiscoCatalyst Sd-wan Manager Version19.0.1a
CiscoCatalyst Sd-wan Manager Version19.1.0
CiscoCatalyst Sd-wan Manager Version19.2.0
CiscoCatalyst Sd-wan Manager Version19.2.1
CiscoCatalyst Sd-wan Manager Version19.2.2
CiscoCatalyst Sd-wan Manager Version19.2.3
CiscoCatalyst Sd-wan Manager Version19.2.31
CiscoCatalyst Sd-wan Manager Version19.2.32
CiscoCatalyst Sd-wan Manager Version19.2.097
CiscoCatalyst Sd-wan Manager Version19.2.098
CiscoCatalyst Sd-wan Manager Version19.2.099
CiscoCatalyst Sd-wan Manager Version19.2.929
CiscoCatalyst Sd-wan Manager Version19.3.0
CiscoCatalyst Sd-wan Manager Version20.1.1
CiscoCatalyst Sd-wan Manager Version20.1.1.1
CiscoCatalyst Sd-wan Manager Version20.1.2
CiscoCatalyst Sd-wan Manager Version20.1.2_937
CiscoCatalyst Sd-wan Manager Version20.1.12
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.17% 0.392
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere

The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.