A vulnerability in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to enumerate user accounts. This vulnerability is due to the improper handling of HTTP headers. An attacker could exploit this vulnerability by sending authenticated requests to an affected system. A successful exploit could allow the attacker to compare the HTTP responses that are returned by the affected system to determine which accounts are valid user accounts.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-enumeration-64eNnDKy | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-05-06 13:15
Updated : 2023-11-07 03:28
NVD link : CVE-2021-1486
Mitre link : CVE-2021-1486
CVE.ORG link : CVE-2021-1486
JSON object : View
Products Affected
cisco
- catalyst_sd-wan_manager
- sd-wan_vmanage
CWE
CWE-203
Observable Discrepancy