### [CVE-2021-1234](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1234) ![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Catalyst%20SD-WAN%20Manager&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=17.2.10%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=17.2.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=17.2.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=17.2.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=17.2.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=17.2.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=17.2.9%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.1.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.3.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.6.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.3.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.0.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.302%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.303%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.501_ES%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.501_es%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=18.4.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.0.1a%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.097%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.098%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.099%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.31%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.32%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.2.929%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=19.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=20.1.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=20.1.1.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=20.1.12%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=20.1.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=20.1.2_937%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere&color=brightgreen) ### Description A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the vManage software must be in cluster mode. This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to view sensitive information on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. ### POC #### Reference No PoCs from references. #### Github - https://github.com/AI-SSD/AI-SSD-research-personal-repository - https://github.com/Aether-0/r3dly-d34dly - https://github.com/Barrosleo/advanced-network-scanner - https://github.com/Billy-Esteves/AI-SSD-research-personal-repository - https://github.com/Cyber-Security-Team-CST/CST-scan - https://github.com/DHARANRAJM/CyberSentinel - https://github.com/Deeazer/ness-pars - https://github.com/Douda/PSSESWrapper - https://github.com/Fussin/AutoPen - https://github.com/GauravGhandat-23/AI-Powered-Threat-Hunting-and-Vulnerability-Assessment-Dashboard - https://github.com/HowToLearnHacking/Shodan-CVE-Finder - https://github.com/Mahi122130/network-scanner-tool - https://github.com/NEONITO/neonito-vuln-checker - https://github.com/OmkarPokharkar/CVE-Scanner - https://github.com/PatrickAcheson/Learning-Plan-Cybersecurity-RAG-System - https://github.com/RAD50/web-port-CVE-scan - https://github.com/RENANth/Pentest - https://github.com/RedDrip7/qax-ti-mcp - https://github.com/SamratDuttaOfficial/npm-packages-checker - https://github.com/Se7enB2st/Threat-Intelligence-Platform - https://github.com/ShreyashDarade/YOLOv8_Nano-Real-Time-Object-Detection - https://github.com/TunahanTuna/pentesting-api - https://github.com/a101e-lab/FirmVulLinker - https://github.com/a1k-ghaz1/LuciVulnScanner-website-scanner- - https://github.com/alberlome/ReconSepher - https://github.com/aravindsastra123/NVD_Assessment - https://github.com/basusaswata/scribe_sample_policy - https://github.com/bungeeagency/vulnscan - https://github.com/corelight/Zeek-CVE-Enrichment - https://github.com/dato-dev/vulnerability_scan - https://github.com/grayf0x05/msf_exploit_finder_tool - https://github.com/hackersupcoming/CVE-Scanners - https://github.com/hilalibrahim/SecOps - https://github.com/iamthierno/DatasetCVE - https://github.com/irfan-sec/Aura-sec - https://github.com/jfrog/jfrog-client-go - https://github.com/jindalayush326/RAG-USING-LANGRAPH - https://github.com/juniorsemacento/CVE-Checker - https://github.com/ksoclabs/image-scan-action - https://github.com/linuxshark/meli-api-challenge - https://github.com/lucasmobileit/vuln-br - https://github.com/lucif3rSoul/LuciVulnScanner - https://github.com/lucif3rSoul/neonito-vuln-checker - https://github.com/n0-traces/cve_monitor - https://github.com/neonito/LuciVulnScanner - https://github.com/rad-security/image-scan-action - https://github.com/ronin7823/CVE-Mangement-System - https://github.com/scribe-public/sample-policies - https://github.com/seokjeon/SARD-vs-CVE - https://github.com/shlomodaari/python-helm-scanner - https://github.com/silverxpymaster/Shodan-CVE-Finder - https://github.com/subrat243/AutoVulnScanner - https://github.com/udibabaskydeck/ralk