Cisco Flags Critical SD-WAN Vulnerability
A flaw in the REST API of Cisco's SD_WAN vManage software could allow remote, unauthenticated attackers to perform data exfiltration.
A critical security vulnerability in Cisco's SD-WAN vManage software could allow a remote, unauthenticated attacker to gain read and limited write permissions, and access data.
The bug carries a score of 9.1 out of 10 on the CVSS vulnerability-severity scale, and it exists in the vManage API, which is used to monitor and configure Cisco devices running on an overlay network, the company explained.
"This vulnerability is due to insufficient request validation when using the REST API feature," according to Cisco's July 12 advisory. "An attacker could exploit this vulnerability by sending a crafted API request to an affected vManage instance."
Cisco has issued a fix, and affected customers should apply the patch as soon as possible.
Last month, Cisco delivered a patch for flaw in its AnyConnect Secure Mobility Client Software, which enables remote workers to connect to a virtual private network (VPN).
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024