CVE-2021-34700

A vulnerability in the CLI interface of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to read arbitrary files on the underlying file system of an affected system. This vulnerability exists because access to sensitive information on an affected system is not sufficiently controlled. An attacker could exploit this vulnerability by gaining unauthorized access to sensitive information on an affected system. A successful exploit could allow the attacker to create forged authentication requests and gain unauthorized access to the web UI of an affected system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*

History

02 Aug 2021, 14:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.9
v3 : 5.5
CWE CWE-522
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-infdis-LggOP9sE - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-infdis-LggOP9sE - Vendor Advisory
CPE cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*

22 Jul 2021, 16:29

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-22 16:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-34700

Mitre link : CVE-2021-34700

CVE.ORG link : CVE-2021-34700


JSON object : View

Products Affected

cisco

  • sd-wan_vmanage
  • catalyst_sd-wan_manager
CWE
CWE-522

Insufficiently Protected Credentials