Impact
A flaw in the access validation of internal REST APIs allows an unauthenticated remote attacker to impersonate a Site Admin, read sensitive data, and modify configuration across tenant boundaries. The weakness stems from missing authentication checks for high‑privilege API endpoints, enabling attackers to gain full administrative control without legitimate credentials.
Affected Systems
The vulnerability impacts Cisco Secure Workload deployments. Specific product versions are not disclosed, so all installations running Cisco Secure Workload before a remediation are potentially affected.
Risk and Exploitability
With a CVSS score of 10, the risk is highest. The EPSS score is not available, but the vulnerability is listed as not present in the CISA KEV catalog, suggesting no discovered public exploits yet. Attackers can target the exposed REST API endpoints from any network location, and the lack of authentication makes exploitation trivial once the endpoint is reachable.
OpenCVE Enrichment