Critical vulnerability in Cisco SD-WAN vManage Software

Cisco addressed multiple vulnerabilities in its SD-WAN vManage Software. One of which allows an attacker to perform actions not granted to average users, such as creating accounts with administrative level access. Below is a comment from Satnam Narang, Staff Research Engineer, Tenable.

“Cisco patched multiple vulnerabilities on Wednesday, including several flaws in its SD-WAN vManage software. The most severe flaw is CVE-2021-1468, an unauthorised message processing vulnerability.

“The flaw exists because the vManage software fails to perform an authentication check on input supplied by the user to the application’s messaging service. This vulnerability could be exploited pre-authentication, meaning the attacker does not need to possess valid credentials and authenticate to the vulnerable application. Successful exploitation would give an attacker the ability to perform actions not granted to average users, such as creating accounts with administrative level access.

“It should be noted that this particular vulnerability as well as several others patched on Wednesday can only be exploited if the vManage software is running in Cluster Mode.

If your organisation uses vManage, we strongly encourage you to apply these patches as soon as possible.” — Satnam Narang, Staff Research Engineer, Tenable

Related posts

Sify Technologies Partners with Cisco ThousandEyes to Help Enterprises Accelerate their Digital Transformation Journey

Whatfix and Deloitte India Forge Strategic Alliance to Accelerate Adoption of Digital Solutions for Indian Enterprises

New Research Highlights AI and Low-Code Synergy Accelerating Application Development in Asia-Pacific

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More