A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability requires the multi-tenant feature to be enabled. This vulnerability is due to insufficient user session management within the Cisco Catalyst SD-WAN Manager system. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain unauthorized access to information about another tenant, make configuration changes, or possibly take a tenant offline causing a denial of service condition.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sd-wan_manager | Cisco | * | 20.6.3.4 (excluding) |
Sd-wan_manager | Cisco | 20.7 (including) | 20.9.3.2 (excluding) |
Sd-wan_manager | Cisco | 20.10 (including) | 20.10.1.2 (excluding) |
Sd-wan_manager | Cisco | 20.11 (including) | 20.11.1.2 (excluding) |