A vulnerability in Cisco IOS XE Software for Cisco Meraki could allow a remote, unauthenticated attacker to view confidential device information. This vulnerability is due to a device configuration upload being performed over an insecure tunnel. An attacker could exploit this vulnerability by conducting an on-path attack between the affected device and the Cisco Meraki Dashboard.
A successful exploit could allow the attacker to view sensitive device configuration information.
Attack Parameters
Impact Assessment
CVSS Vector v3.1