Headline
CVE-2022-20830: Cisco Security Advisory: Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability
A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC without authentication. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server installations of Cisco vManage. An attacker could exploit this vulnerability by accessing the exposed GUI of Cisco SD-AVC. A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses.
When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page, to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Fixed Releases
At the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.
The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability that is described in this advisory and which release included the fix for this vulnerability.
Cisco vManage Release
First Fixed Release
18.3 and earlier
Not affected.
18.4
Migrate to a fixed release.
19.2
Migrate to a fixed release.
20.1
Migrate to a fixed release.
20.3
20.3.4.1
20.3.520.4
Migrate to a fixed release.
20.5
Migrate to a fixed release.
20.6
20.6.1
20.7
20.7.1
20.8
Not affected.
20.9
Not affected.
Note: The vulnerability described in this advisory is associated with the vulnerability described in Cisco Security Advisory cisco-sa-sdavc-ZA5fpXX2. Cisco recommends that administrators take into account both vulnerabilities when planning for a software upgrade.
The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.