Wednesday, March 5, 2025
HomeCiscoCritical Cisco WAN Manager Vulnerabilities Let Attacker Conduct DoS Attack

Critical Cisco WAN Manager Vulnerabilities Let Attacker Conduct DoS Attack

Published on

SIEM as a Service

Follow Us on Google News

Cisco, a prominent player in the world of networking and cybersecurity, has issued a critical security advisory concerning multiple vulnerabilities in their Catalyst SD-WAN Manager, formerly known as Cisco SD-WAN vManage. 

These vulnerabilities could potentially open doors for cyber attackers to access affected systems or cause a significant denial of service (DoS) situation.

First and foremost, it’s important to note that there are no workarounds available to mitigate these vulnerabilities. 

This means that immediate action is necessary to address these critical issues.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

Vulnerabilities Unveiled: CVEs and CVSS Scores

CVE-2023-20252: This vulnerability involves unauthorized access to Cisco Catalyst SD-WAN Manager via Security Assertion Markup Language (SAML) APIs. 

An attacker, even if unauthenticated, could potentially gain unauthorized access to the application as an arbitrary user. The severity of this vulnerability is rated as Critical with a CVSS Base Score of 9.8.

CVE-2023-20253: This vulnerability affects the CLI (Command-Line Interface) of Cisco Catalyst SD-WAN Manager. 

It could allow an authenticated, local attacker with read-only privileges to bypass authorization and roll back controller configurations, which could then be deployed to downstream routers. 

This vulnerability is rated as High with a CVSS Base Score of 8.4.

CVE-2023-20034: Here, an information disclosure vulnerability is revealed. It involves an unauthenticated, remote attacker accessing the Elasticsearch database of an affected system with the privileges of the Elasticsearch user. 

This vulnerability is rated as High with a CVSS Base Score of 7.5.

CVE-2023-20254: This vulnerability pertains to the session management system of Cisco Catalyst SD-WAN Manager’s multi-tenant feature. 

An authenticated, remote attacker could access another tenant managed by the same instance, potentially leading to unauthorized configuration changes or causing a denial of service (DoS) situation. It has a High severity rating with a CVSS Base Score of 7.2.

CVE-2023-20262: Lastly, there is a vulnerability in the SSH (Secure Shell) service of Cisco Catalyst SD-WAN Manager, which could lead to a process crash, resulting in a DoS condition for SSH access. 

This vulnerability is rated as Medium with a CVSS Base Score of 5.3.

Affected Products and Fixed Software

The vulnerabilities impact Cisco Catalyst SD-WAN Manager, and users must determine if their software releases are vulnerable. 

Cisco has released software updates to address these issues. Users with service contracts should obtain security fixes through their usual channels.

Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the free trial to ensure 100% security.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...