CVE-2023-20254

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to access other tenants' data and configurations in Cisco Catalyst SD-WAN Manager when multi-tenant mode is enabled. Attackers could view sensitive information, modify configurations, or cause denial of service. Only organizations using Cisco Catalyst SD-WAN Manager with multi-tenant feature enabled are affected.

💻 Affected Systems

Products:
  • Cisco Catalyst SD-WAN Manager
Versions: All versions prior to 20.12.1
Operating Systems: Not specified - appliance-based
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when multi-tenant feature is enabled. Single-tenant deployments are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative access to all tenants, modifies configurations to disrupt operations, steals sensitive data, and causes widespread service outages across multiple organizations.

🟠

Likely Case

Attacker accesses limited tenant information, makes unauthorized configuration changes to specific tenants, potentially causing service disruptions for affected organizations.

🟢

If Mitigated

Attack is prevented through proper network segmentation, strong authentication controls, and timely patching, limiting impact to isolated incidents.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but exploitation is straightforward once authenticated. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.12.1 and later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z

Restart Required: Yes

Instructions:

1. Download Cisco Catalyst SD-WAN Manager version 20.12.1 or later from Cisco Software Center. 2. Backup current configuration. 3. Apply the update following Cisco's upgrade procedures. 4. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Disable Multi-Tenant Feature

all

Temporarily disable the multi-tenant feature if not required for operations

Requires GUI/CLI configuration changes - consult Cisco documentation

Network Segmentation

all

Restrict access to SD-WAN Manager to only authorized administrative networks

Configure firewall rules to limit source IP addresses

🧯 If You Can't Patch

  • Implement strict network access controls to limit which IP addresses can reach the SD-WAN Manager
  • Enable detailed logging and monitoring for unusual cross-tenant access patterns

🔍 How to Verify

Check if Vulnerable:

Check if multi-tenant feature is enabled and version is below 20.12.1 via SD-WAN Manager GUI or CLI

Check Version:

show version (CLI) or check System > About in GUI

Verify Fix Applied:

Verify version is 20.12.1 or later and test that authenticated users cannot access other tenant data

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to tenant data
  • Configuration changes from unexpected user accounts
  • Session ID anomalies across tenant boundaries

Network Indicators:

  • Unusual API requests targeting multiple tenant endpoints
  • Traffic patterns suggesting cross-tenant data access

SIEM Query:

source="sdwan-manager" AND (event_type="unauthorized_access" OR user_session="*" AND target_tenant!="current_user_tenant")

🔗 References

📤 Share & Export