Improper access control in Cisco SD-WAN vManage - CVE-2022-20696

 

Improper access control in Cisco SD-WAN vManage - CVE-2022-20696

Published: September 8, 2022


Vulnerability identifier: #VU67089
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2022-20696
CWE-ID: CWE-284
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
Cisco SD-WAN vManage
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the messaging server container ports. A remote attacker on the local network can view and inject messages into the messaging service, leading to configuration changes or cause the system to reload.


Remediation

Install updates from vendor's website.

External links