3
CVSSv3

CVE-2021-1234

Vulnerability Summary

A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote malicious user to view sensitive information on an affected system. To be affected by this vulnerability, the vManage software must be in cluster mode. This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the malicious user to view sensitive information on the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmaninfdis3-OvdR6uu8

Vulnerability Trend

Vendor Advisories

A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system To be affected by this vulnerability, the vManage software must be in cluster mode This vulnerability is due to the absence of authentication for sensitive informa ...

Github Repositories

A private-acess fork of valint policy samples library

Sample Policies This repo includes samples of policy configuraions for Scribe's valint tool Quickstart Install valint: curl -sSfL getscribesecuritycom/installsh | sh -s -- -t valint Create an SBOM of a type you want to verify valint bom busybox:latest -o statement-cyclonedx-json

A repo containing KSOC Image Scan GitHub Action

KSOC Image Scan Action KSOC scans for CVEs in your images as part of your GitHub Actions CI workflow This action is using Grype to scan for CVEs in given image Example Usage Build a local image and scan it for CVEs It will fail the workflow if any CVE with medium severity is found It will ignore CVEs with IDs CVE-2021-1234 and CVE-2021-5678 Default output format will be

Этот скрипт предназначен для сканирования установленных пакетов на наличие уязвимостей в операционной системе Ubuntu 20.04. Он сравнивает версии установленных пакетов с информацией о уязвимостях из базы данных, чтобы найти пакеты, которые требуют обновления для устранения уязвимостей.

vulnerability_scan Уязвимости пакетов скрипта Этот скрипт предназначен для сканирования установленных пакетов на наличие уязвимостей в операционной системе Ubuntu 2004 Он сравнивает версии установленных пакетов с ин

Sample Policies You can use Scribe to apply policies at different points along your SDLC For example, at the end of a build or at the admission control point to the production cluster Use cases for example: Images must be signed, and they must have a matching CycloneDX SBOM Images must be built by a CircleCI workflow and produce a signed SLSA provenance Tagged sources must

neonito-vuln-checkerpy Description The script collect information about IP addresses from the iptxt file using queries to shodan and ipdataco services It then generates a JSON file with the data and displays a summary on the console Additionally, the script checks for vulnerabilities (CVEs) associated with each IP address, as well as other characteristics such as honeypot,

LuciVulnScanner Description The script collect information about IP addresses from the iptxt file using queries to shodan and ipdataco services It then generates a JSON file with the data and displays a summary on the console Additionally, the script checks for vulnerabilities (CVEs) associated with each IP address, as well as other characteristics such as honeypot, tor, vp

LuciVulnScanner Description The script collect information about IP addresses from the iptxt file using queries to shodan and ipdataco services It then generates a JSON file with the data and displays a summary on the console Additionally, the script checks for vulnerabilities (CVEs) associated with each IP address, as well as other characteristics such as honeypot, tor, vp

Sample Policies You can use Scribe to apply policies at different points along your SDLC For example, at the end of a build or at the admission control point to the production cluster Use cases for example: Images must be signed, and they must have a matching CycloneDX SBOM Images must be built by a CircleCI workflow and produce a signed SLSA provenance Tagged sources must