From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Description: - Vulnerability Type: Information Disclosure Vulnerability - Affected Product: Cisco SD-WAN vManage Software - Impact: Allows unauthorized remote attackers to read arbitrary files on the affected system. - Root Cause: Insufficient access controls over sensitive information. - Scope: At the time of release, Cisco SD-WAN vManage Software versions prior to 20.3.2 were affected. 2. Affected Versions: - Version 1.0 - Workflow: Final - No workflow available 3. CVSS Score: - Base Score: 6.5 4. Affected Products: - The list of affected products is provided in the vulnerability details section. 5. Workflow: - No workflow available. 6. Fixed Software: - It is recommended to regularly check Cisco’s security advisories to determine exposure and obtain complete upgrade solutions. - At the time of release, Cisco SD-WAN vManage Software versions 20.3.2 and later included the fix. 7. Public Disclosure and Exploitation: - Cisco Product Security Incident Response Team (PSIRT) has not observed any public disclosures or malicious exploitation. 8. Source: - The vulnerability was discovered during internal security testing. 9. Revision History: - Version 1.0: Initial public release, status Final, dated March 3, 2021. 10. Legal Disclaimer: - The document is provided “AS IS” without any warranties or guarantees, including implied warranties of merchantability or fitness for a particular purpose. - The risk of using the document or linked materials is solely borne by the user. - Cisco reserves the right to modify or update the document at any time. This information provides a detailed description of the vulnerability, affected products, remediation steps, and related security advisories.