CVE-2023-20254
📋 TL;DR
This vulnerability allows authenticated remote attackers to access other tenants' data and configurations in Cisco Catalyst SD-WAN Manager when multi-tenant mode is enabled. Attackers could view sensitive information, modify configurations, or cause denial of service. Only organizations using Cisco Catalyst SD-WAN Manager with multi-tenant feature enabled are affected.
💻 Affected Systems
- Cisco Catalyst SD-WAN Manager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full administrative access to all tenants, modifies configurations to disrupt operations, steals sensitive data, and causes widespread service outages across multiple organizations.
Likely Case
Attacker accesses limited tenant information, makes unauthorized configuration changes to specific tenants, potentially causing service disruptions for affected organizations.
If Mitigated
Attack is prevented through proper network segmentation, strong authentication controls, and timely patching, limiting impact to isolated incidents.
🎯 Exploit Status
Requires authenticated access but exploitation is straightforward once authenticated. No public exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 20.12.1 and later
Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z
Restart Required: Yes
Instructions:
1. Download Cisco Catalyst SD-WAN Manager version 20.12.1 or later from Cisco Software Center. 2. Backup current configuration. 3. Apply the update following Cisco's upgrade procedures. 4. Verify successful upgrade and functionality.
🔧 Temporary Workarounds
Disable Multi-Tenant Feature
allTemporarily disable the multi-tenant feature if not required for operations
Requires GUI/CLI configuration changes - consult Cisco documentation
Network Segmentation
allRestrict access to SD-WAN Manager to only authorized administrative networks
Configure firewall rules to limit source IP addresses
🧯 If You Can't Patch
- Implement strict network access controls to limit which IP addresses can reach the SD-WAN Manager
- Enable detailed logging and monitoring for unusual cross-tenant access patterns
🔍 How to Verify
Check if Vulnerable:
Check if multi-tenant feature is enabled and version is below 20.12.1 via SD-WAN Manager GUI or CLI
Check Version:
show version (CLI) or check System > About in GUI
Verify Fix Applied:
Verify version is 20.12.1 or later and test that authenticated users cannot access other tenant data
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to tenant data
- Configuration changes from unexpected user accounts
- Session ID anomalies across tenant boundaries
Network Indicators:
- Unusual API requests targeting multiple tenant endpoints
- Traffic patterns suggesting cross-tenant data access
SIEM Query:
source="sdwan-manager" AND (event_type="unauthorized_access" OR user_session="*" AND target_tenant!="current_user_tenant")