Rewterz Threat Alert – Lazarus APT Group – Active IOCs
July 8, 2021Rewterz Threat Advisory – Multiple Vulnerabilities in FortiMail
July 8, 2021Rewterz Threat Alert – Lazarus APT Group – Active IOCs
July 8, 2021Rewterz Threat Advisory – Multiple Vulnerabilities in FortiMail
July 8, 2021Severity
Medium
Analysis Summary
CVE-2021-1234
A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the vManage software must be in cluster mode. This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to view sensitive information on the affected system.
Impact
- Information Disclosure
- Unauthorized Access
Affected Vendors
Cisco
Affected Products
- Cisco SD-WAN vManage Software Release 20.5.1
- Cisco SD-WAN vManage Software Earlier than Release 20.3.1 as well as releases 20.3.2 and 20.3.3
- Cisco SD-WAN vManage Software Earlier than Release 20.4.1 as well as releases 20.4.1.2 and 20.4.2
Remediation
Refer to Cisco Security Advisory for the patch, upgrade, or suggested workaround information.