A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability requires the multi-tenant feature to be enabled.
This vulnerability is due to insufficient user session management within the Cisco Catalyst SD-WAN Manager system. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain unauthorized access to information about another tenant, make configuration changes, or possibly take a tenant offline causing a denial of service condition.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2023-09-27T17:11:23.280Z
Updated: 2024-08-02T09:05:36.889Z
Reserved: 2022-10-27T18:47:50.372Z
Link: CVE-2023-20254
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2023-09-27T18:15:11.690
Modified: 2023-09-29T17:49:36.903
Link: CVE-2023-20254
Redhat
No data.