QID 317241
Date Published: 2022-10-17
QID 317241: Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password Vulnerability (cisco-sa-sdavc-ZA5fpXX2)
A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC using a default static username and password combination.
Affected Products
20.3.4.1 prior to version 20.6.3
20.7 prior to version 20.7.2
20.8 prior to version 20.8.1
20.9 prior to version 20.9.1
QID detection logic:
The QID checks for Cisco SD WAN version retrieved via Unix Auth using "show system status" command
Note: This QID do not checks SD-AVC status. Hence QID is kept as Practice.
A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses.
Customers are advised to refer to cisco-sa-sdavc-ZA5fpXX2 for more information.
- cisco-sa-sdavc-ZA5fpXX2 -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdavc-ZA5fpXX2
CVEs related to QID 317241
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-sdavc-ZA5fpXX2 |
|