Overview
- Description
- A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability requires the multi-tenant feature to be enabled. This vulnerability is due to insufficient user session management within the Cisco Catalyst SD-WAN Manager system. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain unauthorized access to information about another tenant, make configuration changes, or possibly take a tenant offline causing a denial of service condition.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-732
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:sd-wan_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6BF7AEE-61BF-488D-8439-35B85529DD45", "versionEndExcluding": "20.6.3.4" }, { "criteria": "cpe:2.3:a:cisco:sd-wan_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFA494E8-5817-49FF-AF87-C1E5CC6A366B", "versionEndExcluding": "20.9.3.2", "versionStartIncluding": "20.7" }, { "criteria": "cpe:2.3:a:cisco:sd-wan_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB339115-6B31-4A04-89BC-A053C964CDD4", "versionEndExcluding": "20.10.1.2", "versionStartIncluding": "20.10" }, { "criteria": "cpe:2.3:a:cisco:sd-wan_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD884D68-559B-4169-9790-D8C6F694593E", "versionEndExcluding": "20.11.1.2", "versionStartIncluding": "20.11" } ], "operator": "OR" } ] } ]