Impact
A vulnerability in Cisco Catalyst SD-WAN Manager allows an unauthenticated, remote attacker to read sensitive information on the underlying operating system by accessing the system’s API. The weakness stems from insufficient file system access restrictions, enabling the attacker to retrieve data that should be protected. This leads to exposure of confidential or privileged information without requiring authentication.
Affected Systems
Cisco Catalyst SD-WAN Manager, particularly versions that match the identified CPEs, including the 20.12.6 release. All deployments of the product that have not applied the vendor’s fix are susceptible.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium severity vulnerability, and the EPSS score of less than 1% suggests a low likelihood of exploitation at the current time. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. The likely attack vector is remote, via the exposed API, and the impact is limited to information disclosure; there is no evidence of code execution, privilege escalation, or denial of service.
OpenCVE Enrichment