A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-infodis-73sHJNEq - Vendor Advisory |
13 May 2022, 18:41
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.5 |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-infodis-73sHJNEq - Vendor Advisory | |
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:a:cisco:sd-wan_vmanage:20.7:*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:* |
15 Apr 2022, 15:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-15 15:15
Updated : 2024-11-21 06:43
NVD link : CVE-2022-20747
Mitre link : CVE-2022-20747
CVE.ORG link : CVE-2022-20747
JSON object : View
Products Affected
cisco
- sd-wan_vmanage
- catalyst_sd-wan_manager
CWE