QID 317241

Date Published: 2022-10-17

QID 317241: Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username and Password Vulnerability (cisco-sa-sdavc-ZA5fpXX2)

A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC using a default static username and password combination.

Affected Products
20.3.4.1 prior to version 20.6.3
20.7 prior to version 20.7.2
20.8 prior to version 20.8.1
20.9 prior to version 20.9.1
QID detection logic:
The QID checks for Cisco SD WAN version retrieved via Unix Auth using "show system status" command
Note: This QID do not checks SD-AVC status. Hence QID is kept as Practice.

A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses.

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution

    Customers are advised to refer to cisco-sa-sdavc-ZA5fpXX2 for more information.

    CVEs related to QID 317241

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-sdavc-ZA5fpXX2 URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdavc-ZA5fpXX2