ID

VAR-202104-1953


CVE

CVE-2021-1482


TITLE

Cisco Systems  Cisco Catalyst SD-WAN Manager  Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-021892

DESCRIPTION

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain access to sensitive information on an affected system. This vulnerability is due to insufficient authorization checks. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to bypass authorization checking and gain access to sensitive information on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager There is an input validation vulnerability in.Information may be obtained and information may be tampered with. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. This advisory is available at the following link:tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC

Trust: 2.25

sources: NVD: CVE-2021-1482 // JVNDB: JVNDB-2021-021892 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-1482

AFFECTED PRODUCTS

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.7

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.5

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.0.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.302

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.2

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.2

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.2.1_930

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.099

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.501_es

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.32

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.6

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.8

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.7

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.2.1_927

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.5

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.303

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.4.1.0.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.2_928

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.6

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.4.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.5

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.8

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.31

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.098

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.6.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.3

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.3

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.0.1a

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.6

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.10

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.3

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.12

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.2.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.3.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.097

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.4.0.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.2_925

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.4.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.3

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.0.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.3.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.2

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.3.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.2_929

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.2_937

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.1.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.929

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.9

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.3.2.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.2_937

Trust: 1.0

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.4

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.8

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.8

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.6.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.1.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.4

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.4.0

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.2.0

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.10

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.6

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.7

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.0

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.5

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.5

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.6

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.3

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.7

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.9

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.3.1

Trust: 0.8

sources: JVNDB: JVNDB-2021-021892 // NVD: CVE-2021-1482

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@cisco.com: CVE-2021-1482
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2021-021892
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202104-1650
value: MEDIUM

Trust: 0.6

psirt@cisco.com: CVE-2021-1482
baseSeverity: MEDIUM
baseScore: 6.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.1
impactScore: 2.7
version: 3.1

Trust: 1.0

OTHER: JVNDB-2021-021892
baseSeverity: MEDIUM
baseScore: 6.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-021892 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1650 // NVD: CVE-2021-1482

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-021892 // NVD: CVE-2021-1482

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:cisco-sa-vman-auth-bypass-Z3Zze5XCurl:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC

Trust: 0.8

title:Cisco SD-WAN vManage Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=148217

Trust: 0.6

title:Cisco: Cisco SD-WAN vManage Authorization Bypass Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-vman-auth-bypass-Z3Zze5XC

Trust: 0.1

sources: VULMON: CVE-2021-1482 // JVNDB: JVNDB-2021-021892 // CNNVD: CNNVD-202104-1650

EXTERNAL IDS

db:NVDid:CVE-2021-1482

Trust: 3.3

db:JVNDBid:JVNDB-2021-021892

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:AUSCERTid:ESB-2021.1364

Trust: 0.6

db:CS-HELPid:SB2021042201

Trust: 0.6

db:CNNVDid:CNNVD-202104-1650

Trust: 0.6

db:VULMONid:CVE-2021-1482

Trust: 0.1

sources: VULMON: CVE-2021-1482 // JVNDB: JVNDB-2021-021892 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1650 // NVD: CVE-2021-1482

REFERENCES

url:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-vman-auth-bypass-z3zze5xc

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2021-1482

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-vman-auth-bypass-z3zze5xc

Trust: 0.7

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021042201

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1364

Trust: 0.6

sources: VULMON: CVE-2021-1482 // JVNDB: JVNDB-2021-021892 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1650 // NVD: CVE-2021-1482

SOURCES

db:VULMONid:CVE-2021-1482
db:JVNDBid:JVNDB-2021-021892
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202104-1650
db:NVDid:CVE-2021-1482

LAST UPDATE DATE

2025-08-06T20:33:04.017000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-021892date:2025-08-05T05:17:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202104-1650date:2021-04-23T00:00:00
db:NVDid:CVE-2021-1482date:2025-08-04T14:39:55.723

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-021892date:2025-08-05T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202104-1650date:2021-04-21T00:00:00
db:NVDid:CVE-2021-1482date:2024-11-15T17:15:08.530