cisco sd-wan_vmanage 关键功能的认证机制缺失

CVE编号

CVE-2022-20830

利用情况

暂无

补丁情况

N/A

披露时间

2022-10-11
漏洞描述
A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC without authentication. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server installations of Cisco vManage. An attacker could exploit this vulnerability by accessing the exposed GUI of Cisco SD-AVC. A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 cisco sd-wan_vmanage * From
(including)
18.4
Up to
(excluding)
20.3.4.1
运行在以下环境
应用 cisco sd-wan_vmanage * From
(including)
20.4
Up to
(excluding)
20.6.1
运行在以下环境
应用 cisco sd-wan_vmanage 20.7 -
CVSS3评分
5.3
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-306 关键功能的认证机制缺失
阿里云安全产品覆盖情况