Cisco SD-WAN vManage Authorization Bypass (cisco-sa-vman-auth-bypass-Z3Zze5XC)

medium Nessus Plugin ID 148978

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco SD-WAN vManage Software is affected by an unspecified vulnerability in the web-based management interface. An unauthenticated, remote attacker can exploit this by sending carefully crafted HTTP requests to the affected system. A successful exploit could allow the attacker to bypass authorization checking and gain access to sensitive information on the system.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvw93076

See Also

http://www.nessus.org/u?7c8dd507

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw93076

Plugin Details

Severity: Medium

ID: 148978

File Name: cisco-sa-vman-auth-bypass-Z3Zze5XC.nasl

Version: 1.5

Type: local

Family: CISCO

Published: 4/23/2021

Updated: 1/26/2022

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS Score Source: CVE-2021-1482

CVSS v3

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5.6

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:sd-wan_vmanage, cpe:/o:cisco:sd-wan_firmware

Required KB Items: Cisco/Viptela/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/21/2021

Vulnerability Publication Date: 4/21/2021

Reference Information

CVE: CVE-2021-1482

CWE: 20

CISCO-SA: cisco-sa-vman-auth-bypass-Z3Zze5XC

IAVA: 2021-A-0188-S

CISCO-BUG-ID: CSCvw93076