All the vulnerabilites related to Cisco - Cisco Catalyst SD-WAN Manager
cve-2021-1481
Vulnerability from cvelistv5
Published
2024-11-15 16:37
Modified
2024-11-15 17:49
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 Version: 20.3.2 Version: 19.2.32 Version: 20.3.2_925 Version: 20.3.2.1 Version: 20.3.2.1_927 Version: 18.4.6 Version: 20.1.2_937 Version: 20.4.1 Version: 20.3.2_928 Version: 20.3.2_929 Version: 20.4.1.0.1 Version: 20.3.2.1_930 Version: 19.2.4 Version: 20.4.1.1 Version: 20.3.3 Version: 19.2.4.0.1 Version: 20.3.2_937 Version: 20.3.3.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1481", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:49:18.528065Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:49:36.250Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "20.3.2_925" }, { "status": "affected", "version": "20.3.2.1" }, { "status": "affected", "version": "20.3.2.1_927" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.1.2_937" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "20.3.2_928" }, { "status": "affected", "version": "20.3.2_929" }, { "status": "affected", "version": "20.4.1.0.1" }, { "status": "affected", "version": "20.3.2.1_930" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "19.2.4.0.1" }, { "status": "affected", "version": "20.3.2_937" }, { "status": "affected", "version": "20.3.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to conduct Cypher query language injection attacks on an affected system.\r\nThis vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface of an affected system. A successful exploit could allow the attacker to obtain sensitive information.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-943", "description": "Improper Neutralization of Special Elements in Data Query Logic", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:37:23.188Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vmanage-cql-inject-c7z9QqyB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC" } ], "source": { "advisory": "cisco-sa-vmanage-cql-inject-c7z9QqyB", "defects": [ "CSCvw93066" ], "discovery": "EXTERNAL" }, "title": "Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1481", "datePublished": "2024-11-15T16:37:23.188Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-15T17:49:36.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1491
Vulnerability from cvelistv5
Published
2024-11-15 16:25
Modified
2024-11-15 16:28
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Software Information Disclosure Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 Version: 20.3.2 Version: 19.2.32 Version: 20.3.2_925 Version: 20.3.2.1 Version: 20.3.2.1_927 Version: 18.4.6 Version: 20.1.2_937 Version: 20.4.1 Version: 20.3.2_928 Version: 20.3.2_929 Version: 20.4.1.0.1 Version: 20.3.2.1_930 Version: 19.2.4 Version: 20.4.1.1 Version: 20.3.3 Version: 19.2.4.0.1 Version: 20.3.2_937 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1491", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:28:44.277189Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:28:58.834Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "20.3.2_925" }, { "status": "affected", "version": "20.3.2.1" }, { "status": "affected", "version": "20.3.2.1_927" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.1.2_937" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "20.3.2_928" }, { "status": "affected", "version": "20.3.2_929" }, { "status": "affected", "version": "20.4.1.0.1" }, { "status": "affected", "version": "20.3.2.1_930" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "19.2.4.0.1" }, { "status": "affected", "version": "20.3.2_937" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying file system of the device.\r\nThis vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the file system and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the file system of the underlying operating system.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X", "version": "3.0" }, "format": "cvssV3_0" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:25:02.254Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vmanage-info-disclos-gGvm9Mfu", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu" } ], "source": { "advisory": "cisco-sa-vmanage-info-disclos-gGvm9Mfu", "defects": [ "CSCvv03493" ], "discovery": "EXTERNAL" }, "title": "Cisco SD-WAN vManage Software Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1491", "datePublished": "2024-11-15T16:25:02.254Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-15T16:28:58.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1470
Vulnerability from cvelistv5
Published
2024-11-15 16:38
Modified
2024-11-15 17:02
Severity ?
EPSS score ?
Summary
Cisco SD-WAN SQL Injection Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 Version: 19.2.32 Version: 18.4.6 Version: 20.1.2_937 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1470", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:01:37.997706Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:02:36.804Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.1.2_937" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\nThis vulnerability is due to improper input validation of SQL queries to an affected system. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the vManage database or the underlying operating system.Cisco\u0026nbsp;has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:38:56.058Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdw-sqlinj-HDJUeEAX", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-sqlinj-HDJUeEAX" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB" } ], "source": { "advisory": "cisco-sa-sdw-sqlinj-HDJUeEAX", "defects": [ "CSCvu92477" ], "discovery": "EXTERNAL" }, "title": "Cisco SD-WAN SQL Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1470", "datePublished": "2024-11-15T16:38:56.058Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-15T17:02:36.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26071
Vulnerability from cvelistv5
Published
2024-11-18 16:05
Modified
2024-11-18 16:23
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vEdge Arbitrary File Creation Vulnerability
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES |
||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2020-26071", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T16:23:33.627962Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:23:51.429Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vContainer", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "19.2.3" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge Cloud", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "19.2.3" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge Router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "19.1.01" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "20.1.11" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco\u0026nbsp;SD-WAN Software could allow an authenticated, local attacker to create or overwrite arbitrary files on an affected device, which could result in a denial of service (DoS) condition.\r\nThe vulnerability is due to insufficient input validation for specific commands. An attacker could exploit this vulnerability by including crafted arguments to those specific commands. A successful exploit could allow the attacker to create or overwrite arbitrary files on the affected device, which could result in a DoS condition.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:05:35.221Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vsoln-arbfile-gtsEYxns", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns" } ], "source": { "advisory": "cisco-sa-vsoln-arbfile-gtsEYxns", "defects": [ "CSCvv09807" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vEdge Arbitrary File Creation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-26071", "datePublished": "2024-11-18T16:05:35.221Z", "dateReserved": "2020-09-24T00:00:00.000Z", "dateUpdated": "2024-11-18T16:23:51.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1466
Vulnerability from cvelistv5
Published
2024-11-15 17:04
Modified
2024-11-15 18:20
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vDaemon Buffer Overflow Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 19.2.1 Version: 18.4.4 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1466", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:20:51.133605Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:20:54.312Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the vDaemon service of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, local attacker to cause a buffer overflow on an affected system, resulting in a\u0026nbsp;denial of service (DoS) condition.\r\nThe vulnerability is due to incomplete bounds checks for data that is provided to the vDaemon service of an affected system. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could allow the attacker to cause the vDaemon listening service to reload and result in a DoS condition.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:04:35.138Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdwan-vdaemon-bo-RuzzEA2", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2" } ], "source": { "advisory": "cisco-sa-sdwan-vdaemon-bo-RuzzEA2", "defects": [ "CSCvt11526" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vDaemon Buffer Overflow Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1466", "datePublished": "2024-11-15T17:04:35.138Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-15T18:20:54.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1462
Vulnerability from cvelistv5
Published
2024-11-18 15:30
Modified
2024-11-18 15:51
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Software Privilege Escalation Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1462", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T15:51:27.804209Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:51:45.679Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, local attacker to elevate privileges on an affected system. To exploit this vulnerability, an attacker would need to have a valid Administrator account on an affected system.\r\nThe vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to an affected system with an Administrator account and creating a malicious file, which the system would parse at a later time. A successful exploit could allow the attacker to obtain root privileges on the affected system.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:X/RL:X/RC:X", "version": "3.0" }, "format": "cvssV3_0" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:30:12.049Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdwan-privesc-vman-kth3c82B", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-kth3c82B" } ], "source": { "advisory": "cisco-sa-sdwan-privesc-vman-kth3c82B", "defects": [ "CSCvt11534" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vManage Software Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1462", "datePublished": "2024-11-18T15:30:12.049Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-18T15:51:45.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1483
Vulnerability from cvelistv5
Published
2024-11-15 16:27
Modified
2024-11-15 17:57
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Software XML External Entity Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 Version: 20.3.2 Version: 19.2.32 Version: 20.3.2_925 Version: 20.3.2.1 Version: 20.3.2.1_927 Version: 18.4.6 Version: 20.1.2_937 Version: 20.4.1 Version: 20.3.2_928 Version: 20.3.2_929 Version: 20.4.1.0.1 Version: 20.3.2.1_930 Version: 19.2.4 Version: 20.4.1.1 Version: 20.3.3 Version: 19.2.4.0.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1483", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:57:24.743087Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:57:44.233Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "20.3.2_925" }, { "status": "affected", "version": "20.3.2.1" }, { "status": "affected", "version": "20.3.2.1_927" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.1.2_937" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "20.3.2_928" }, { "status": "affected", "version": "20.3.2_929" }, { "status": "affected", "version": "20.4.1.0.1" }, { "status": "affected", "version": "20.3.2.1_930" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "19.2.4.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.\r\nThis vulnerability is due to improper handling of XML External Entity (XXE) entries when the affected software parses certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "Improper Restriction of XML External Entity Reference", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:27:43.715Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vman-xml-ext-entity-q6Z7uVUg", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX" } ], "source": { "advisory": "cisco-sa-vman-xml-ext-entity-q6Z7uVUg", "defects": [ "CSCvw93084" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vManage Software XML External Entity Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1483", "datePublished": "2024-11-15T16:27:43.715Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-15T17:57:44.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26066
Vulnerability from cvelistv5
Published
2024-11-18 16:23
Modified
2024-11-18 17:20
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Software XML External Entity Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 19.2.929 Version: 19.2.31 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.098:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.501_es:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "catalyst_sd-wan_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_es" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2020-26066", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T17:17:52.413610Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T17:20:31.871Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.\r\nThe vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X", "version": "3.0" }, "format": "cvssV3_0" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "Improper Restriction of XML External Entity Reference", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:23:47.442Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vmanx3-vrZbOqqD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx3-vrZbOqqD" } ], "source": { "advisory": "cisco-sa-vmanx3-vrZbOqqD", "defects": [ "CSCvv09746" ], "discovery": "EXTERNAL" }, "title": "Cisco SD-WAN vManage Software XML External Entity Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-26066", "datePublished": "2024-11-18T16:23:47.442Z", "dateReserved": "2020-09-24T00:00:00.000Z", "dateUpdated": "2024-11-18T17:20:31.871Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1484
Vulnerability from cvelistv5
Published
2024-11-15 16:26
Modified
2024-11-15 17:59
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Command Injection Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 Version: 20.3.2 Version: 20.3.2.1 Version: 20.3.2.1_927 Version: 20.4.1 Version: 20.3.2_928 Version: 20.3.2_929 Version: 20.4.1.0.1 Version: 20.3.2.1_930 Version: 19.2.4 Version: 20.4.1.1 Version: 20.3.3 Version: 19.2.4.0.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1484", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:59:03.118902Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:59:14.156Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "20.3.2.1" }, { "status": "affected", "version": "20.3.2.1_927" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "20.3.2_928" }, { "status": "affected", "version": "20.3.2_929" }, { "status": "affected", "version": "20.4.1.0.1" }, { "status": "affected", "version": "20.3.2.1_930" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "19.2.4.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to inject arbitrary commands on an affected system and cause a denial of service (DoS) condition.\r\nThis vulnerability is due to improper input validation of user-supplied input to the device template configuration. An attacker could exploit this vulnerability by submitting crafted input to the device template configuration. A successful exploit could allow the attacker to cause a DoS condition on the affected system.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:26:12.341Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vman-cmdinj-nRHKgfHX", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu" } ], "source": { "advisory": "cisco-sa-vman-cmdinj-nRHKgfHX", "defects": [ "CSCvw93086" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vManage Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1484", "datePublished": "2024-11-15T16:26:12.341Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-15T17:59:14.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1232
Vulnerability from cvelistv5
Published
2024-11-18 15:40
Modified
2024-11-18 16:22
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Information Disclosure Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1232", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T16:22:14.771701Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:22:35.477Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of an affected system.\r\nThis vulnerability is due to insufficient access control for sensitive information that is written to an affected system. An attacker could exploit this vulnerability by accessing sensitive information that they are not authorized to access on an affected system. A successful exploit could allow the attacker to gain access to devices and other network management systems that they should not have access to.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "Insufficiently Protected Credentials", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:40:17.633Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdwanvman-infodis1-YuQScHB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanvman-infodis1-YuQScHB" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-distupd-N87eB6Z3" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipphone-rce-dos-U2PsSkz3" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ethernet-dos-HGXgJH8n", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-ethernet-dos-HGXgJH8n" } ], "source": { "advisory": "cisco-sa-sdwanvman-infodis1-YuQScHB", "defects": [ "CSCvu28397" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vManage Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1232", "datePublished": "2024-11-18T15:40:17.633Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-18T16:22:35.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1482
Vulnerability from cvelistv5
Published
2024-11-15 16:36
Modified
2024-11-15 17:51
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Authorization Bypass Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 Version: 20.3.2 Version: 19.2.32 Version: 20.3.2_925 Version: 20.3.2.1 Version: 20.3.2.1_927 Version: 18.4.6 Version: 20.1.2_937 Version: 20.4.1 Version: 20.3.2_928 Version: 20.3.2_929 Version: 20.4.1.0.1 Version: 20.3.2.1_930 Version: 19.2.4 Version: 20.4.1.1 Version: 20.3.3 Version: 19.2.4.0.1 Version: 20.3.2_937 Version: 20.3.3.1 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1482", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:51:08.793614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:51:26.242Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "20.3.2_925" }, { "status": "affected", "version": "20.3.2.1" }, { "status": "affected", "version": "20.3.2.1_927" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.1.2_937" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "20.3.2_928" }, { "status": "affected", "version": "20.3.2_929" }, { "status": "affected", "version": "20.4.1.0.1" }, { "status": "affected", "version": "20.3.2.1_930" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "19.2.4.0.1" }, { "status": "affected", "version": "20.3.2_937" }, { "status": "affected", "version": "20.3.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain access to sensitive information on an affected system.\r\nThis vulnerability is due to insufficient authorization checks. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to bypass authorization checking and gain access to sensitive information on the affected system.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:36:11.822Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vman-auth-bypass-Z3Zze5XC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC" } ], "source": { "advisory": "cisco-sa-vman-auth-bypass-Z3Zze5XC", "defects": [ "CSCvw93076" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vManage Authorization Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1482", "datePublished": "2024-11-15T16:36:11.822Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-15T17:51:26.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1461
Vulnerability from cvelistv5
Published
2024-11-18 15:33
Modified
2024-11-18 15:53
Severity ?
EPSS score ?
Summary
Cisco SD-WAN Software Signature Verification Bypass Vulnerability
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 19.2.1 Version: 18.4.4 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 19.2.929 Version: 19.2.31 Version: 19.2.32 Version: 19.2.4 |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1461", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T15:52:43.584510Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:53:00.942Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "19.2.4" } ] }, { "defaultStatus": "unknown", "product": "Cisco SD-WAN vEdge Router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "19.1.01" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "19.2.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Image Signature Verification feature of Cisco\u0026nbsp;SD-WAN Software could allow an authenticated, remote attacker with Administrator-level credentials to install a malicious software patch on an affected device.\r\nThe vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.Cisco\u0026nbsp;has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "Improper Verification of Cryptographic Signature", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:33:06.681Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdwan-sigverbypass-gPYXd6Mk", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM\u003c/a\u003e\u003c/p\u003e\u003cp\u003eThis advisory is part of the October 2021 release of the Cisco\u0026nbsp;ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see \u003ca href=\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773\"\u003eCisco\u0026nbsp;Event Response: October 2021 Cisco\u0026nbsp;ASA, FMC, and FTD Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM" } ], "source": { "advisory": "cisco-sa-sdwan-sigverbypass-gPYXd6Mk", "defects": [ "CSCvs92954" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN Software Signature Verification Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1461", "datePublished": "2024-11-18T15:33:06.681Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-18T15:53:00.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26074
Vulnerability from cvelistv5
Published
2024-11-18 15:56
Modified
2024-11-18 16:52
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Privilege Escalation Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.098:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.501_es:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "catalyst_sd-wan_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_es" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2020-26074", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T16:52:20.241785Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:52:24.869Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in system file transfer functions of Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, local attacker to gain escalated privileges on the underlying operating system.\r\nThe vulnerability is due to improper validation of path input to the system file transfer functions. An attacker could exploit this vulnerability by sending requests that contain specially crafted path variables to the vulnerable system. A successful exploit could allow the attacker to overwrite arbitrary files, allowing the attacker to modify the system in such a way that could allow the attacker to gain escalated privileges.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "Execution with Unnecessary Privileges", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:56:13.890Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vmanage-escalation-Jhqs5Skf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-escalation-Jhqs5Skf" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy" } ], "source": { "advisory": "cisco-sa-vmanage-escalation-Jhqs5Skf", "defects": [ "CSCvv21757" ], "discovery": "EXTERNAL" }, "title": "Cisco SD-WAN vManage Privilege Escalation Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-26074", "datePublished": "2024-11-18T15:56:13.890Z", "dateReserved": "2020-09-24T00:00:00.000Z", "dateUpdated": "2024-11-18T16:52:24.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1464
Vulnerability from cvelistv5
Published
2024-11-15 16:32
Modified
2024-11-15 17:52
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Authorization Bypass Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 18.4.501_ES Version: 18.4.6 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1464", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T17:52:06.403700Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:52:30.162Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "18.4.6" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco\u0026nbsp;SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain restricted access to the configuration information of an affected system.\r\nThis vulnerability exists because the affected software has insufficient input validation for certain commands. An attacker could exploit this vulnerability by sending crafted requests to the affected commands of an affected system. A successful exploit could allow the attacker to bypass authorization checking and gain restricted access to the configuration data of the affected system.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:32:20.193Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vman-authorization-b-GUEpSLK", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-authorization-b-GUEpSLK" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-sqlinj-HDJUeEAX", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-sqlinj-HDJUeEAX" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-dir-trav-Bpwc5gtm", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-dir-trav-Bpwc5gtm" } ], "source": { "advisory": "cisco-sa-vman-authorization-b-GUEpSLK", "defects": [ "CSCvu28370" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vManage Authorization Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1464", "datePublished": "2024-11-15T16:32:20.193Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-15T17:52:30.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1234
Vulnerability from cvelistv5
Published
2024-11-18 15:45
Modified
2024-11-18 16:42
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Information Disclosure Vulnerabilities
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 Version: 19.2.32 Version: 18.4.6 Version: 20.1.2_937 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.098:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.501_es:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.32:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2_937:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "catalyst_sd-wan_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_es" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.1.2_937" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2021-1234", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T16:37:04.603401Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:42:26.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "19.2.32" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "20.1.2_937" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the cluster management interface of Cisco\u0026nbsp;SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the vManage software must be in cluster mode.\r\nThis vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to view sensitive information on the affected system.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-497", "description": "Exposure of Sensitive System Information to an Unauthorized Control Sphere", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:45:40.772Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdwan-vmaninfdis3-OvdR6uu8", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmaninfdis3-OvdR6uu8" } ], "source": { "advisory": "cisco-sa-sdwan-vmaninfdis3-OvdR6uu8", "defects": [ "CSCvu28450" ], "discovery": "INTERNAL" }, "title": "Cisco SD-WAN vManage Information Disclosure Vulnerabilities" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1234", "datePublished": "2024-11-18T15:45:40.772Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-18T16:42:26.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20475
Vulnerability from cvelistv5
Published
2024-09-25 16:19
Modified
2024-09-25 18:35
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Cross-Site Scripting Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.6.1 Version: 20.6.1.1 Version: 20.6.0.18.3 Version: 20.6.0.18.4 Version: 20.6.1.0.1 Version: 20.6.2 Version: 20.7.1EFT2 Version: 20.7.1 Version: 20.6.2.1 Version: 20.6.2.2 Version: 20.7.1.1 Version: 20.6.2.2.2 Version: 20.6.2.2.3 Version: 20.6.2.0.4 Version: 20.6.2.2.7 Version: 20.6.3 Version: 20.7.1.0.2 Version: 20.8.1 Version: 20.6.3.0.7 Version: 20.6.3.0.5 Version: 20.6.3.0.10 Version: 20.6.3.0.2 Version: 20.7.2 Version: 20.6.3.0.11 Version: 20.6.3.0.14 Version: 20.6.3.0.19 Version: 20.6.3.0.18 Version: 20.6.3.0.23 Version: 20.6.3.0.25 Version: 20.6.3.0.27 Version: 20.6.3.0.29 Version: 20.10.1 Version: 20.6.3.0.33 Version: 20.9.1_LI_Images Version: 20.10.1_LI_Images Version: 20.9.3 Version: 20.6.5.1 Version: 20.11.1 Version: 20.11.1_LI_Images Version: 20.9.3_LI_ Images Version: 20.6.3.1.1 Version: 20.9.3.0.3 Version: 20.6.3.2 Version: 20.6.4.1 Version: 20.6.3.0.39 Version: 20.6.5.2 Version: 20.10.1.1 Version: 20.6.2.2.4 Version: 20.6.1.2 Version: 20.11.1.1 Version: 20.6.3.0.40 Version: 20.9.2.2 Version: 20.6.5.2.3 Version: 20.6.5.1.5 Version: 20.9.3.0.4 Version: 20.6.4.0.19 Version: 20.6.3.3 Version: 20.6.5.4 Version: 20.6.5.1.7 Version: 20.9.3.0.12 Version: 20.11.1.2 Version: 20.6.3.4 Version: 20.10.1.2 Version: 20.6.5.1.10 Version: 20.6.5.2.4 Version: 20.9.3.0.18 Version: 20.6.3.0.47 Version: 20.9.2.3 Version: 20.9.3.0.21 Version: 20.9.4_LI_Images Version: 20.9.4 Version: 20.6.5.1.11 Version: 20.12.1 Version: 20.12.1_LI_Images Version: 20.9.3.0.23 Version: 20.9.4.1 Version: 20.9.4.1_LI_Images Version: 20.9.3.0.25 Version: 20.9.3.0.24 Version: 20.6.5.1.14 Version: 20.9.3.0.26 Version: 20.6.3.0.51 Version: 20.12.2 Version: 20.12.2_LI_Images Version: 20.6.6.0.1 Version: 20.13.1_LI_Images Version: 20.9.4.0.4 Version: 20.13.1 Version: 20.9.4.1.1 Version: 20.9.5 Version: 20.9.5_LI_Images Version: 20.12.3_LI_Images Version: 20.12.3 Version: 20.9.4.1.3 Version: 20.6.7 Version: 20.9.5.1 Version: 20.9.5.1_LI_Images Version: 20.14.1 Version: 20.14.1_LI_Images Version: 20.9.5.2_LI_Images Version: 20.12.3.1 Version: 20.12.4 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20475", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T18:35:31.732359Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T18:35:41.286Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.6.1" }, { "status": "affected", "version": "20.6.1.1" }, { "status": "affected", "version": "20.6.0.18.3" }, { "status": "affected", "version": "20.6.0.18.4" }, { "status": "affected", "version": "20.6.1.0.1" }, { "status": "affected", "version": "20.6.2" }, { "status": "affected", "version": "20.7.1EFT2" }, { "status": "affected", "version": "20.7.1" }, { "status": "affected", "version": "20.6.2.1" }, { "status": "affected", "version": "20.6.2.2" }, { "status": "affected", "version": "20.7.1.1" }, { "status": "affected", "version": "20.6.2.2.2" }, { "status": "affected", "version": "20.6.2.2.3" }, { "status": "affected", "version": "20.6.2.0.4" }, { "status": "affected", "version": "20.6.2.2.7" }, { "status": "affected", "version": "20.6.3" }, { "status": "affected", "version": "20.7.1.0.2" }, { "status": "affected", "version": "20.8.1" }, { "status": "affected", "version": "20.6.3.0.7" }, { "status": "affected", "version": "20.6.3.0.5" }, { "status": "affected", "version": "20.6.3.0.10" }, { "status": "affected", "version": "20.6.3.0.2" }, { "status": "affected", "version": "20.7.2" }, { "status": "affected", "version": "20.6.3.0.11" }, { "status": "affected", "version": "20.6.3.0.14" }, { "status": "affected", "version": "20.6.3.0.19" }, { "status": "affected", "version": "20.6.3.0.18" }, { "status": "affected", "version": "20.6.3.0.23" }, { "status": "affected", "version": "20.6.3.0.25" }, { "status": "affected", "version": "20.6.3.0.27" }, { "status": "affected", "version": "20.6.3.0.29" }, { "status": "affected", "version": "20.10.1" }, { "status": "affected", "version": "20.6.3.0.33" }, { "status": "affected", "version": "20.9.1_LI_Images" }, { "status": "affected", "version": "20.10.1_LI_Images" }, { "status": "affected", "version": "20.9.3" }, { "status": "affected", "version": "20.6.5.1" }, { "status": "affected", "version": "20.11.1" }, { "status": "affected", "version": "20.11.1_LI_Images" }, { "status": "affected", "version": "20.9.3_LI_ Images" }, { "status": "affected", "version": "20.6.3.1.1" }, { "status": "affected", "version": "20.9.3.0.3" }, { "status": "affected", "version": "20.6.3.2" }, { "status": "affected", "version": "20.6.4.1" }, { "status": "affected", "version": "20.6.3.0.39" }, { "status": "affected", "version": "20.6.5.2" }, { "status": "affected", "version": "20.10.1.1" }, { "status": "affected", "version": "20.6.2.2.4" }, { "status": "affected", "version": "20.6.1.2" }, { "status": "affected", "version": "20.11.1.1" }, { "status": "affected", "version": "20.6.3.0.40" }, { "status": "affected", "version": "20.9.2.2" }, { "status": "affected", "version": "20.6.5.2.3" }, { "status": "affected", "version": "20.6.5.1.5" }, { "status": "affected", "version": "20.9.3.0.4" }, { "status": "affected", "version": "20.6.4.0.19" }, { "status": "affected", "version": "20.6.3.3" }, { "status": "affected", "version": "20.6.5.4" }, { "status": "affected", "version": "20.6.5.1.7" }, { "status": "affected", "version": "20.9.3.0.12" }, { "status": "affected", "version": "20.11.1.2" }, { "status": "affected", "version": "20.6.3.4" }, { "status": "affected", "version": "20.10.1.2" }, { "status": "affected", "version": "20.6.5.1.10" }, { "status": "affected", "version": "20.6.5.2.4" }, { "status": "affected", "version": "20.9.3.0.18" }, { "status": "affected", "version": "20.6.3.0.47" }, { "status": "affected", "version": "20.9.2.3" }, { "status": "affected", "version": "20.9.3.0.21" }, { "status": "affected", "version": "20.9.4_LI_Images" }, { "status": "affected", "version": "20.9.4" }, { "status": "affected", "version": "20.6.5.1.11" }, { "status": "affected", "version": "20.12.1" }, { "status": "affected", "version": "20.12.1_LI_Images" }, { "status": "affected", "version": "20.9.3.0.23" }, { "status": "affected", "version": "20.9.4.1" }, { "status": "affected", "version": "20.9.4.1_LI_Images" }, { "status": "affected", "version": "20.9.3.0.25" }, { "status": "affected", "version": "20.9.3.0.24" }, { "status": "affected", "version": "20.6.5.1.14" }, { "status": "affected", "version": "20.9.3.0.26" }, { "status": "affected", "version": "20.6.3.0.51" }, { "status": "affected", "version": "20.12.2" }, { "status": "affected", "version": "20.12.2_LI_Images" }, { "status": "affected", "version": "20.6.6.0.1" }, { "status": "affected", "version": "20.13.1_LI_Images" }, { "status": "affected", "version": "20.9.4.0.4" }, { "status": "affected", "version": "20.13.1" }, { "status": "affected", "version": "20.9.4.1.1" }, { "status": "affected", "version": "20.9.5" }, { "status": "affected", "version": "20.9.5_LI_Images" }, { "status": "affected", "version": "20.12.3_LI_Images" }, { "status": "affected", "version": "20.12.3" }, { "status": "affected", "version": "20.9.4.1.3" }, { "status": "affected", "version": "20.6.7" }, { "status": "affected", "version": "20.9.5.1" }, { "status": "affected", "version": "20.9.5.1_LI_Images" }, { "status": "affected", "version": "20.14.1" }, { "status": "affected", "version": "20.14.1_LI_Images" }, { "status": "affected", "version": "20.9.5.2_LI_Images" }, { "status": "affected", "version": "20.12.3.1" }, { "status": "affected", "version": "20.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T16:19:47.236Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdwan-xss-zQ4KPvYd", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-xss-zQ4KPvYd" } ], "source": { "advisory": "cisco-sa-sdwan-xss-zQ4KPvYd", "defects": [ "CSCwk43942" ], "discovery": "EXTERNAL" }, "title": "Cisco SD-WAN vManage Cross-Site Scripting Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20475", "datePublished": "2024-09-25T16:19:47.236Z", "dateReserved": "2023-11-08T15:08:07.681Z", "dateUpdated": "2024-09-25T18:35:41.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26073
Vulnerability from cvelistv5
Published
2024-11-18 15:57
Modified
2024-11-18 16:52
Severity ?
EPSS score ?
Summary
Cisco SD-WAN vManage Directory Traversal Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 20.1.12 Version: 19.2.1 Version: 18.4.4 Version: 18.4.5 Version: 20.1.1.1 Version: 20.1.1 Version: 19.3.0 Version: 19.2.2 Version: 19.2.099 Version: 18.3.6 Version: 18.3.7 Version: 19.2.0 Version: 18.3.8 Version: 19.0.0 Version: 19.1.0 Version: 18.4.302 Version: 18.4.303 Version: 19.2.097 Version: 19.2.098 Version: 17.2.10 Version: 18.3.6.1 Version: 19.0.1a Version: 18.2.0 Version: 18.4.3 Version: 18.4.1 Version: 17.2.8 Version: 18.3.3.1 Version: 18.4.0 Version: 18.3.1 Version: 17.2.6 Version: 17.2.9 Version: 18.3.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.5 Version: 18.4.0.1 Version: 18.3.3 Version: 17.2.7 Version: 17.2.4 Version: 18.3.0 Version: 19.2.3 Version: 18.4.501_ES Version: 20.3.1 Version: 20.1.2 Version: 19.2.929 Version: 19.2.31 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.098:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.501_es:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "catalyst_sd-wan_manager", "vendor": "cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_es" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2020-26073", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T16:46:16.696945Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T16:52:48.583Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "18.3.6" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "19.0.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.098" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "19.0.1a" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "18.4.501_ES" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.31" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the application data endpoints of Cisco\u0026nbsp;SD-WAN vManage Software could allow an unauthenticated, remote attacker to gain access to sensitive information.\r\nThe vulnerability is due to improper validation of directory traversal character sequences within requests to application programmatic interfaces (APIs). An attacker could exploit this vulnerability by sending malicious requests to an API within the affected application. A successful exploit could allow the attacker to conduct directory traversal attacks and gain access to sensitive information including credentials or user tokens.Cisco\u0026nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/RL:X/RC:X/E:X", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-35", "description": "Path Traversal: \u0027.../...//\u0027", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:57:25.059Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vman-traversal-hQh24tmk", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-traversal-hQh24tmk" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-dos-7uZWwSEy" }, { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-escalation-Jhqs5Skf", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-escalation-Jhqs5Skf" } ], "source": { "advisory": "cisco-sa-vman-traversal-hQh24tmk", "defects": [ "CSCvv21754" ], "discovery": "EXTERNAL" }, "title": "Cisco SD-WAN vManage Directory Traversal Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-26073", "datePublished": "2024-11-18T15:57:25.059Z", "dateReserved": "2020-09-24T00:00:00.000Z", "dateUpdated": "2024-11-18T16:52:48.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-1465
Vulnerability from cvelistv5
Published
2024-11-18 15:26
Modified
2024-11-18 15:52
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a directory traversal attack and obtain read access to sensitive files on an affected system.
The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to write arbitrary files on the affected system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco Catalyst SD-WAN Manager |
Version: 17.2.6 Version: 17.2.7 Version: 17.2.8 Version: 17.2.9 Version: 17.2.10 Version: 17.2.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.3.1 Version: 18.3.3 Version: 18.3.4 Version: 18.3.5 Version: 18.3.7 Version: 18.3.8 Version: 18.3.6.1 Version: 18.3.1 Version: 18.3.0 Version: 18.4.0.1 Version: 18.4.3 Version: 18.4.302 Version: 18.4.303 Version: 18.4.4 Version: 18.4.5 Version: 18.4.0 Version: 18.4.1 Version: 19.2.0 Version: 19.2.097 Version: 19.2.099 Version: 19.2.1 Version: 19.2.2 Version: 19.2.3 Version: 19.2.31 Version: 19.2.929 Version: 20.1.1.1 Version: 20.1.12 Version: 20.1.1 Version: 19.3.0 Version: 19.1.0 Version: 18.2.0 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-1465", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T15:52:25.316177Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:52:42.063Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a directory traversal attack and obtain read access to sensitive files on an affected system.\r\n The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to write arbitrary files on the affected system." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-18T15:26:13.298Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-vman-dir-trav-Bpwc5gtm", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-dir-trav-Bpwc5gtm" } ], "source": { "advisory": "cisco-sa-vman-dir-trav-Bpwc5gtm", "defects": [ "CSCvu28396" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1465", "datePublished": "2024-11-18T15:26:13.298Z", "dateReserved": "2020-11-13T00:00:00.000Z", "dateUpdated": "2024-11-18T15:52:42.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-20655
Vulnerability from cvelistv5
Published
2024-11-15 15:56
Modified
2024-11-15 21:00
Severity ?
EPSS score ?
Summary
A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.
The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco IOS XR Software |
Version: N/A |
||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:ios_xr_software:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ios_xr_software", "vendor": "cisco", "versions": [ { "lessThan": "7.0.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.1.1", "status": "affected", "version": "7.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "virtual_topology_system", "vendor": "cisco", "versions": [ { "lessThan": "2.6.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "network_services_orchestrator", "vendor": "cisco", "versions": [ { "lessThan": "4.3.9.1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.4.5.6", "status": "affected", "version": "4.4.0.0", "versionType": "custom" }, { "lessThan": "4.5.7", "status": "affected", "version": "4.5.0", "versionType": "custom" }, { "lessThan": "4.6.1.7", "status": "affected", "version": "4.6.0", "versionType": "custom" }, { "lessThan": "4.7.1", "status": "affected", "version": "4.7.0", "versionType": "custom" }, { "lessThan": "5.1.0.1", "status": "affected", "version": "5.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:enterprise_nfv_infrastructure_software:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "enterprise_nfv_infrastructure_software", "vendor": "cisco", "versions": [ { "lessThan": "3.12.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "catalyst_sd-wan_manager", "vendor": "cisco", "versions": [ { "lessThan": "18.4.4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "19.2.1", "status": "affected", "version": "19.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:cisco:ios_xe_catalyst_sd-wan:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ios_xe_catalyst_sd-wan", "vendor": "cisco", "versions": [ { "lessThan": "16.10.2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "16.12.1b", "status": "affected", "version": "16.12.0", "versionType": "custom" }, { "lessThan": "17.2.1r", "status": "affected", "version": "17.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:sd-wan_vedge_router:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sd-wan_vedge_router", "vendor": "cisco", "versions": [ { "lessThan": "18.4.4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "19.2.1", "status": "affected", "version": "19.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:carrier_packet_transport:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "carrier_packet_transport", "vendor": "cisco", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-20655", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T19:43:18.170598Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T21:00:58.460Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS XR Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Virtual Topology System (VTS)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Network Services Orchestrator", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Enterprise NFV Infrastructure Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Catalyst SD-WAN", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Catalyst SD-WAN Manager", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco IOS XE Catalyst SD-WAN", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco SD-WAN vEdge Router", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Ultra Gateway Platform", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Carrier Packet Transport", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.5" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" }, { "status": "affected", "version": "2.5" }, { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "9.2.2" }, { "status": "affected", "version": "1.4.0" }, { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "1.2" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.3.0" }, { "status": "affected", "version": "2.3.3" }, { "status": "affected", "version": "2.3.5" }, { "status": "affected", "version": "2.3.4" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.3" }, { "status": "affected", "version": "2.0.4" }, { "status": "affected", "version": "2.0.5" }, { "status": "affected", "version": "2.4.0" }, { "status": "affected", "version": "2.2.2" }, { "status": "affected", "version": "2.2.3" }, { "status": "affected", "version": "10.8.0" }, { "status": "affected", "version": "7.0.3" }, { "status": "affected", "version": "7.0.1" }, { "status": "affected", "version": "1.0.2" }, { "status": "affected", "version": "1.1.1" }, { "status": "affected", "version": "1.1.2" }, { "status": "affected", "version": "4.1" }, { "status": "affected", "version": "4.0" }, { "status": "affected", "version": "12.1.0" }, { "status": "affected", "version": "9.8.1" }, { "status": "affected", "version": "9.8.0" }, { "status": "affected", "version": "4.1.82" }, { "status": "affected", "version": "4.1.4" }, { "status": "affected", "version": "4.6.1" }, { "status": "affected", "version": "4.0.4" }, { "status": "affected", "version": "4.0.3" }, { "status": "affected", "version": "6.2.4" }, { "status": "affected", "version": "3.0.5" }, { "status": "affected", "version": "3.0.6" }, { "status": "affected", "version": "3.0.7" }, { "status": "affected", "version": "3.0.3" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "9.5.0" }, { "status": "affected", "version": "9.5.3" }, { "status": "affected", "version": "9.5.1" }, { "status": "affected", "version": "9.5.2" }, { "status": "affected", "version": "9.7.0" }, { "status": "affected", "version": "9.521" }, { "status": "affected", "version": "4.5.0" }, { "status": "affected", "version": "4.7.0" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.2.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\r\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T15:56:42.927Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cli-cmdinj-4MttWZPB", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB" }, { "name": "cisco-sa-confdcli-cmdinj-wybQDSSh", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh" } ], "source": { "advisory": "cisco-sa-cli-cmdinj-4MttWZPB", "defects": [ "CSCvq22323", "CSCvq58164", "CSCvq58224", "CSCvq58168", "CSCvq58183", "CSCvq58226", "CSCvz49669", "CSCvq58204", "CSCvm76596" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2022-20655", "datePublished": "2024-11-15T15:56:42.927Z", "dateReserved": "2021-11-02T13:28:29.037Z", "dateUpdated": "2024-11-15T21:00:58.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }