This security bulletin contains one medium risk vulnerability.
Exploit availability: NoDescription
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to presence of hard-coded credentials in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC). A remote unauthenticated attacker can view managed device names, SD-AVC logs and SD-AVC DNS server IP addresses.Mitigation
Install updates from vendor's website.Vulnerable software versions
Cisco vManage Network Management Software: 18.104.22.168 - 20.9External links
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to open a a specially crafted file.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.