CVE-2021-1589
23.09.2021, 03:15
A vulnerability in the disaster recovery feature of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain unauthorized access to user credentials. This vulnerability exists because access to API endpoints is not properly restricted. An attacker could exploit this vulnerability by sending a request to an API endpoint. A successful exploit could allow the attacker to gain unauthorized access to administrative credentials that could be used in further attacks.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | sd-wan | 20.3 ≤ 𝑥 < 20.3.4 |
cisco | sd-wan | 20.4 ≤ 𝑥 < 20.4.2 |
cisco | sd-wan | 20.5 ≤ 𝑥 < 20.5.2 |
cisco | sd-wan | 20.6 ≤ 𝑥 < 20.6.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-256 - Plaintext Storage of a PasswordStoring a password in plaintext may result in a system compromise.
- CWE-522 - Insufficiently Protected CredentialsThe product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.