Table of Contents
  • Home
  • /
  • Blog
  • /
  • Critical Flaws Uncovered in Cisco SD-WAN Manager
November 2, 2023
|
6m

Critical Flaws Uncovered in Cisco SD-WAN Manager


Cisco Sd Wan Manager

Cisco recently disclosed 5 critical vulnerabilities in their SD-WAN Manager product that could allow remote attackers to gain unauthorized access, rollback configurations, disclose sensitive information, and cause denial of service conditions if left unpatched. Cisco SD-WAN Manager users should immediately assess their exposure and apply patches to avoid potential attacks leveraging these flaws. The newly discovered vulnerabilities highlight the increased attack surface and risks introduced when using centralized controllers for distributed networks.

Critical Unauthorized Access, Rollback, and Disclosure Vulnerabilities

The most severe of the vulnerabilities disclosed are:

  • CVE-2023-20252: This critical 9.8 CVSS-rated vulnerability allows unauthenticated remote code execution via improper authentication on Cisco SD-WAN Manager SAML APIs. Successful exploitation gives an attacker full system access. This vulnerability is due to improper authentication checks for SAML APIs. An attacker could exploit this vulnerability by sending requests directly to the SAML APIs. A successful exploit could allow the attacker to generate an authorization token sufficient to access the application.

  • CVE-2023-20253: A high 8.4 CVSS-rated flaw allows authenticated users with read-only privileges to rollback controller configurations via the CLI. Attackers could leverage this to deploy malicious config changes. This vulnerability is due to improper access control enforcement on the Cisco Catalyst SD-WAN Manager CLI. An attacker with read-only access to the CLI could exploit this vulnerability by initiating a configuration rollback on the Cisco Catalyst SD-WAN Manager controller. A successful exploit could allow the attacker to roll back the configuration on an affected Cisco Catalyst SD-WAN Manager instance, which could then be deployed to the downstream routers

  • CVE-2023-20034: This high 7.5 CVSS vulnerability enables unauthenticated information disclosure by accessing the Elasticsearch database. Attackers could view sensitive operational data. This vulnerability is due to improper access control on Cisco Catalyst SD-WAN Manager for the Elasticsearch service. An attacker could exploit this vulnerability by sending a crafted HTTP request to a reachable Cisco Catalyst SD-WAN Manager system. A successful exploit could allow the attacker to view the Elasticsearch database content as the Elasticsearch user.

  • CVE-2023-20254: A high severity vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature which could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability is due to insufficient user session management within the Cisco Catalyst SD-WAN Manager system. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to access information about another tenant, make configuration changes, or possibly take a tenant offline and cause a DoS condition.

  • CVE-2023-20262:A vulnerability in the SSH service of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to cause a process crash, resulting in a DoS condition for SSH access only. This vulnerability does not prevent the system from continuing to function, and web UI access is not affected.

These vulnerabilities demonstrate systemic security issues in Cisco SD-WAN Manager related to authentication, authorization, and access controls. An adversary able to exploit any of them could fully compromise the confidentiality, integrity, and availability of the controller.

Affected Systems and Versions

The critical unauthorized access and rollback vulnerabilities affect Cisco SD-WAN Manager versions 20.3 through 20.11. The information disclosure flaw impacts versions 20.3 to 20.9.

Cisco has released patches fixing the defects across affected versions. All users should upgrade to the latest available release. Delaying patches leaves organizations open to being compromised via these attack vectors.

ReleaseCVE-2023-20252Critical SIRCVE-2023-20253High SIRCVE-2023-20034High SIRCVE-2023-20254High SIRCVE-2023-20262Medium SIR
Earlier than 20.3Not affected.Not affected.Migrate to a fixed release.Not affected.Migrate to a fixed release.
20.3Not affected.Not affected.20.3.4Not affected.20.3.7
20.4Not affected.Migrate to a fixed release.Migrate to a fixed release.Migrate to a fixed release.Migrate to a fixed release.
20.5Not affected.Migrate to a fixed release.Migrate to a fixed release.Migrate to a fixed release.Migrate to a fixed release.
20.6Not affected.20.6.220.6.120.6.3.420.6.6
20.7Not affected.20.7.120.7.1Migrate to a fixed release.Migrate to a fixed release.
20.8Not affected.20.8.1Not affected.Migrate to a fixed release.Migrate to a fixed release.
20.920.9.4120.9.1Not affected.20.9.3.220.9.3
20.10Not affected.20.10.1Not affected.20.10.1.2Migrate to a fixed release.
20.11Migrate to a fixed release.120.11.1Not affected.20.11.1.220.11.1
20.12Not affected.Not affected.Not affected.Not affected.20.12.1

Hardening Cisco SD-WAN Manager Security

In addition to patching, several best practices can help harden Cisco SD-WAN Manager environments against threats:

  • Carefully restrict SAML API, CLI, and database access to the minimum necessary.

  • Employ robust multi-factor authentication for admin access.

  • Monitor logs and alerts for signs of unauthorized activity.

  • Consider using a zero-trust network access model for controllers.

  • Keep controllers fully isolated from external networks.

Controlling access is critical given the power centralized controllers have over overall network operations.

Recommended Actions for Customers

Organizations using affected Cisco SD-WAN Manager versions should immediately take these steps:

  • Audit your deployment to identify vulnerable systems.

  • Apply the latest patched controller release.

  • Tighten access controls per the hardening tips above.

  • Closely monitor logs and alerts for any sign of compromise.

  • Consider perimeter controls like firewalls and IPS to detect and block attacks.

  • Validate multi-factor authentication is required for admin access.

Taking prompt action is essential to mitigate risks from these vulnerabilities being exploited in the wild.

The Growing Threat Landscape for SD-WAN

The vulnerabilities in Cisco SD-WAN Manager highlight that SD-WAN environments face an evolving threat landscape. Attack surfaces are increasing as networks shift to dynamic distributed architectures managed through centralized controllers.

It’s critical that organizations maintain rigorous security protections, patching, and hardening for their SD-WAN deployments. Paying close attention to vendor security advisories and best practices is essential to avoiding compromise.

SD-WAN introduces powerful benefits but also risks. As adoption accelerates, so too will efforts by attackers to exploit potential vulnerabilities. Proper planning, controls, and response procedures are vital to enjoying SD-WAN’s advantages safely.

Bottom Line

The critical flaws uncovered in Cisco SD-WAN Manager serve as a reminder of the need for comprehensive security strategies tailored for SD-WAN environments. Rapid response to patches, hardening, logging, and access controls are key to reducing the risk of attacks via centralized controllers.

While SD-WAN delivers significant productivity and efficiency gains, those benefits cannot come at the expense of security. Maintaining rigorous protections and responding quickly to emerging threats enables organizations to safely realize the full value of SD-WAN.

We hope this post helps you know how to protect Cisco SD-WAN Manager – Patch Now to Avoid Attacks. Please share this post and help secure the digital world.Visit our website thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive updates like this.

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Application Security

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe