A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability requires the multi-tenant feature to be enabled. This vulnerability is due to insufficient user session management within the Cisco Catalyst SD-WAN Manager system. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain unauthorized access to information about another tenant, make configuration changes, or possibly take a tenant offline causing a denial of service condition.
History

Wed, 23 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco catalyst Sd-wan Manager
CPEs cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
Vendors & Products Cisco catalyst Sd-wan Manager
Metrics ssvc

{'options': {'Automatable': 'No', 'Exploitation': 'None', 'Technical Impact': 'Total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2023-09-27T17:11:23.280Z

Updated: 2024-10-23T19:39:16.225Z

Reserved: 2022-10-27T18:47:50.372Z

Link: CVE-2023-20254

cve-icon Vulnrichment

Updated: 2024-08-02T09:05:36.889Z

cve-icon NVD

Status : Analyzed

Published: 2023-09-27T18:15:11.690

Modified: 2023-09-29T17:49:36.903

Link: CVE-2023-20254

cve-icon Redhat

No data.