Cisco Flags Critical SD-WAN Vulnerability
A flaw in the REST API of Cisco's SD_WAN vManage software could allow remote, unauthenticated attackers to perform data exfiltration.
A critical security vulnerability in Cisco's SD-WAN vManage software could allow a remote, unauthenticated attacker to gain read and limited write permissions, and access data.
The bug carries a score of 9.1 out of 10 on the CVSS vulnerability-severity scale, and it exists in the vManage API, which is used to monitor and configure Cisco devices running on an overlay network, the company explained.
"This vulnerability is due to insufficient request validation when using the REST API feature," according to Cisco's July 12 advisory. "An attacker could exploit this vulnerability by sending a crafted API request to an affected vManage instance."
Cisco has issued a fix, and affected customers should apply the patch as soon as possible.
Last month, Cisco delivered a patch for flaw in its AnyConnect Secure Mobility Client Software, which enables remote workers to connect to a virtual private network (VPN).
About the Author(s)
You May Also Like
Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024