// For flags

CVE-2021-1535

Cisco SD-WAN vManage Information Disclosure Vulnerability

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the Cisco SD-WAN vManage Software must be in cluster mode. This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to allow the attacker to view sensitive information on the affected system.

Una vulnerabilidad en la interfaz de administración de clúster de Cisco SD-WAN vManage Software, podría permitir a un atacante remoto no autenticado visualizar información confidencial en un sistema afectado. Para estar afectado por esta vulnerabilidad, Cisco SD-WAN vManage Software debe estar en modo de clúster. Esta vulnerabilidad es debido a la ausencia de autenticación de información confidencial en la interfaz de administración del clúster. Un atacante podría explotar esta vulnerabilidad mediante el envío una petición diseñada a la interfaz de administración del clúster de un sistema afectado. Una explotación con éxito podría permitir al atacante visualizar información confidencial en el sistema afectado

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-11-13 CVE Reserved
  • 2021-05-06 CVE Published
  • 2024-05-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Sd-wan Vmanage
Search vendor "Cisco" for product "Sd-wan Vmanage"
< 20.5.1
Search vendor "Cisco" for product "Sd-wan Vmanage" and version " < 20.5.1"
-
Affected