CVE-2021-1589Plaintext Storage of a Password in Cisco Sd-wan

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 52.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 23
Latest updateMay 24

Description

A vulnerability in the disaster recovery feature of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain unauthorized access to user credentials. This vulnerability exists because access to API endpoints is not properly restricted. An attacker could exploit this vulnerability by sending a request to an API endpoint. A successful exploit could allow the attacker to gain unauthorized access to administrative credentials that could be used in further attacks.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

NVDcisco/sd-wan20.320.3.4+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6fff-rx48-97mq: A vulnerability in the disaster recovery feature of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain unauthorized a2022-05-24
CVEList
Cisco SD-WAN vManage Software Disaster Recovery Feature Password Exposure Vulnerability2021-09-23

📋Vendor Advisories

1
Cisco
Cisco SD-WAN vManage Software Disaster Recovery Feature Password Exposure Vulnerability2021-09-22
CVE-2021-1589 — Plaintext Storage of a Password | cvebase