// For flags

CVE-2021-34712

Cisco SD-WAN vManage Software Cypher Query Language Injection Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct cypher query language injection attacks on an affected system. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface of an affected system. A successful exploit could allow the attacker to obtain sensitive information.

Una vulnerabilidad en la interfaz de administración basada en la web de Cisco SD-WAN vManage Software podría permitir a un atacante remoto autenticado realizar ataques de inyección de lenguaje de consulta cifrado en un sistema afectado. Esta vulnerabilidad es debido a que la interfaz de administración basada en la web no comprueba suficientemente las entradas. Un atacante podría explotar esta vulnerabilidad mediante el envío de peticiones HTTP diseñadas a la interfaz de un sistema afectado. Una explotación con éxito podría permitir al atacante conseguir información confidencial

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-06-15 CVE Reserved
  • 2021-09-23 CVE Published
  • 2023-04-15 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-943: Improper Neutralization of Special Elements in Data Query Logic
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Catalyst Sd-wan Manager
Search vendor "Cisco" for product "Catalyst Sd-wan Manager"
>= 20.4 <= 20.4.2
Search vendor "Cisco" for product "Catalyst Sd-wan Manager" and version " >= 20.4 <= 20.4.2"
-
Affected
Cisco
Search vendor "Cisco"
Catalyst Sd-wan Manager
Search vendor "Cisco" for product "Catalyst Sd-wan Manager"
20.5
Search vendor "Cisco" for product "Catalyst Sd-wan Manager" and version "20.5"
-
Affected
Cisco
Search vendor "Cisco"
Catalyst Sd-wan Manager
Search vendor "Cisco" for product "Catalyst Sd-wan Manager"
20.6
Search vendor "Cisco" for product "Catalyst Sd-wan Manager" and version "20.6"
-
Affected
Cisco
Search vendor "Cisco"
Sd-wan Vmanage
Search vendor "Cisco" for product "Sd-wan Vmanage"
>= 20.3 < 20.3.4
Search vendor "Cisco" for product "Sd-wan Vmanage" and version " >= 20.3 < 20.3.4"
-
Affected