A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. These actions could include modifying the system configuration and deleting accounts.
References
| Link | Resource |
|---|---|
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-csrf-rxQL4tXR | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Oct 2023, 16:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Cisco catalyst Sd-wan Manager
|
|
| CPE | cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7:*:*:*:*:*:*:* |
Information
Published : 2022-04-15 15:15
Updated : 2023-11-07 03:42
NVD link : CVE-2022-20735
Mitre link : CVE-2022-20735
JSON object : View
Products Affected
cisco
- catalyst_sd-wan_manager
- sd-wan_vmanage
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
