Cisco Flags Critical SD-WAN Vulnerability

  /     /     /  
Publicated : 23/11/2024   Category : security


Cisco Flags Critical SD-WAN Vulnerability


A flaw in the REST API of Ciscos SD_WAN vManage software could allow remote, unauthenticated attackers to perform data exfiltration.



A critical security vulnerability in Ciscos SD-WAN vManage software could allow a remote, unauthenticated attacker to gain read and limited write permissions, and access data.
The bug carries a score of 9.1 out of 10 on the CVSS vulnerability-severity scale, and it exists in the
vManage API
, which is used to monitor and configure Cisco devices running on an overlay network, the company explained.
This vulnerability is due to insufficient request validation when using the REST API feature, according to Ciscos July 12 advisory. An attacker could exploit this vulnerability by sending a crafted API request to an affected vManage instance.
Cisco has issued a fix, and affected customers should apply the patch as soon as possible.
Last month,
Cisco delivered a patch
for flaw in its AnyConnect Secure Mobility Client Software, which enables remote workers to connect to a virtual private network (VPN).

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cisco Flags Critical SD-WAN Vulnerability