Impact
The vulnerability stems from a failure to hide sensitive data in device configurations and templates within the web UI, allowing an attacker who is authenticated with read‑only permissions to elevate to a high‑privileged user. This flaw enables unauthorized modification of configuration settings, compromising the integrity of the SD‑WAN Manager and potentially affecting confidentiality and availability. The weakness aligns with CWE‑779, which involves improper validation or life‑time management leading to privilege escalation.
Affected Systems
The affected product is Cisco Catalyst SD‑WAN Manager, previously known as SD‑WAN vManage. No specific version information is provided, so all current deployments of this product are considered at risk.
Risk and Exploitability
The CVSS score of 5.4 indicates a medium severity assessment; EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires legitimate access with read‑only rights and is performed through the web interface. Because the attacker needs to authenticate, the attack vector is web‑based and internal to the networked environment where the SD‑WAN Manager is hosted.
OpenCVE Enrichment