CVE-2022-20844
Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC using a default static username and password combination. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server installations of Cisco vManage. An attacker could exploit this vulnerability by accessing the exposed GUI of Cisco SD-AVC. A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses.
Una vulnerabilidad en el mecanismo de autenticación de Cisco Software-Defined Application Visibility and Control (SD-AVC) en Cisco vManage podría permitir a un atacante remoto no autenticado acceder a la GUI de Cisco SD-AVC usando una combinación estática predeterminada de nombre de usuario y contraseña. Esta vulnerabilidad se presenta porque la GUI es accesible en instalaciones autoadministradas en la nube o en instalaciones de servidores locales de Cisco vManage. Un atacante podría explotar esta vulnerabilidad al acceder a la GUI expuesta de Cisco SD-AVC. Una explotación con éxito podría permitir al atacante visualizar los nombres de los dispositivos gestionados, los registros de SD-AVC y las direcciones IP del servidor DNS de SD-AVC
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2021-11-02 CVE Reserved
- 2022-09-30 CVE Published
- 2024-04-20 EPSS Updated
- 2024-11-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdavc-ZA5fpXX2 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Sd-wan Search vendor "Cisco" for product "Sd-wan" | >= 20.4.1 < 20.6.3 Search vendor "Cisco" for product "Sd-wan" and version " >= 20.4.1 < 20.6.3" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Sd-wan Search vendor "Cisco" for product "Sd-wan" | 20.3.4.1 Search vendor "Cisco" for product "Sd-wan" and version "20.3.4.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Sd-wan Search vendor "Cisco" for product "Sd-wan" | 20.3.4.2 Search vendor "Cisco" for product "Sd-wan" and version "20.3.4.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Sd-wan Search vendor "Cisco" for product "Sd-wan" | 20.3.5 Search vendor "Cisco" for product "Sd-wan" and version "20.3.5" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Sd-wan Search vendor "Cisco" for product "Sd-wan" | 20.7.1 Search vendor "Cisco" for product "Sd-wan" and version "20.7.1" | - |
Affected
|