Impact
A vulnerability in Cisco Catalyst SD-WAN Manager allows an unauthenticated, remote attacker to view sensitive information on the underlying operating system due to insufficient file system restrictions. The flaw enables an attacker with netadmin privileges to access the vshell of an affected system, granting read access to protected OS files. Based on the description, it is inferred that the attack can be carried out remotely. The impact is limited to information disclosure; no evidence of code execution or privilege escalation is described.
Affected Systems
Cisco Catalyst SD-WAN Manager, primarily versions that match the identified CPEs, including the 20.12.6 release. All deployments that have not applied the vendor’s fix are susceptible.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium severity vulnerability, and the EPSS score of 1% suggests a low likelihood of exploitation at the current time. The vulnerability is listed in CISA’s KEV catalog. The likely attack vector is remote via the vshell, a detail inferred from the description of an unauthenticated, remote attacker, and the impact is confined to information disclosure with no evidence of code execution, privilege escalation, or denial of service.
OpenCVE Enrichment