Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cnvd-2023-80110
Vulnerability from cnvd
Title: Cisco Catalyst SD-WAN Manager本地文件包含漏洞
Description:
Cisco Catalyst SD-WAN Manager是一款开放、安全的云级架构管理控制台。
Cisco Catalyst SD-WAN Manager web UI存在本地文件包含漏洞,远程攻击者可利用该漏洞提交特殊的请求,可以应用程序上下文读取系统文件内容。
Severity: 中
Patch Name: Cisco Catalyst SD-WAN Manager本地文件包含漏洞的补丁
Patch Description:
Cisco Catalyst SD-WAN Manager是一款开放、安全的云级架构管理控制台。
Cisco Catalyst SD-WAN Manager web UI存在本地文件包含漏洞,远程攻击者可利用该漏洞提交特殊的请求,可以应用程序上下文读取系统文件内容。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe
Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-20261
Impacted products
Name | Cisco Catalyst SD-WAN Manager |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2023-20261", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2023-20261" } }, "description": "Cisco Catalyst SD-WAN Manager\u662f\u4e00\u6b3e\u5f00\u653e\u3001\u5b89\u5168\u7684\u4e91\u7ea7\u67b6\u6784\u7ba1\u7406\u63a7\u5236\u53f0\u3002\n\nCisco Catalyst SD-WAN Manager web UI\u5b58\u5728\u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u7684\u8bf7\u6c42\uff0c\u53ef\u4ee5\u5e94\u7528\u7a0b\u5e8f\u4e0a\u4e0b\u6587\u8bfb\u53d6\u7cfb\u7edf\u6587\u4ef6\u5185\u5bb9\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2023-80110", "openTime": "2023-10-17", "patchDescription": "Cisco Catalyst SD-WAN Manager\u662f\u4e00\u6b3e\u5f00\u653e\u3001\u5b89\u5168\u7684\u4e91\u7ea7\u67b6\u6784\u7ba1\u7406\u63a7\u5236\u53f0\u3002\r\n\r\nCisco Catalyst SD-WAN Manager web UI\u5b58\u5728\u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u7684\u8bf7\u6c42\uff0c\u53ef\u4ee5\u5e94\u7528\u7a0b\u5e8f\u4e0a\u4e0b\u6587\u8bfb\u53d6\u7cfb\u7edf\u6587\u4ef6\u5185\u5bb9\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Cisco Catalyst SD-WAN Manager\u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Cisco Catalyst SD-WAN Manager" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2023-20261", "serverity": "\u4e2d", "submitTime": "2023-10-23", "title": "Cisco Catalyst SD-WAN Manager\u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e" }
CVE-2023-20261 (GCVE-0-2023-20261)
Vulnerability from cvelistv5
Published
2023-10-18 16:27
Modified
2025-06-12 15:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.
This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco SD-WAN vManage |
Version: 17.2.6 Version: 17.2.7 Version: 17.2.8 Version: 17.2.9 Version: 17.2.10 Version: 17.2.4 Version: 17.2.5 Version: 18.3.1.1 Version: 18.3.3.1 Version: 18.3.3 Version: 18.3.4 Version: 18.3.5 Version: 18.3.7 Version: 18.3.8 Version: 18.3.6.1 Version: 18.3.1 Version: 18.3.0 Version: 18.4.0.1 Version: 18.4.3 Version: 18.4.302 Version: 18.4.303 Version: 18.4.4 Version: 18.4.5 Version: 18.4.0 Version: 18.4.1 Version: 18.4.6 Version: 19.2.0 Version: 19.2.097 Version: 19.2.099 Version: 19.2.1 Version: 19.2.2 Version: 19.2.3 Version: 19.2.31 Version: 19.2.929 Version: 19.2.4 Version: 20.1.1.1 Version: 20.1.12 Version: 20.1.1 Version: 20.1.2 Version: 20.1.3 Version: 19.3.0 Version: 19.1.0 Version: 18.2.0 Version: 20.3.1 Version: 20.3.2 Version: 20.3.2.1 Version: 20.3.3 Version: 20.3.3.1 Version: 20.3.4 Version: 20.3.4.1 Version: 20.3.4.2 Version: 20.3.5 Version: 20.3.6 Version: 20.3.7 Version: 20.3.7.1 Version: 20.3.4.3 Version: 20.3.5.1 Version: 20.3.7.2 Version: 20.3.8 Version: 20.4.1 Version: 20.4.1.1 Version: 20.4.1.2 Version: 20.4.2 Version: 20.4.2.2 Version: 20.4.2.1 Version: 20.4.2.3 Version: 20.5.1 Version: 20.5.1.2 Version: 20.5.1.1 Version: 20.6.1 Version: 20.6.1.1 Version: 20.6.2.1 Version: 20.6.2.2 Version: 20.6.2 Version: 20.6.3 Version: 20.6.3.1 Version: 20.6.4 Version: 20.6.5 Version: 20.6.5.1 Version: 20.6.1.2 Version: 20.6.3.2 Version: 20.6.4.1 Version: 20.6.5.2 Version: 20.6.5.4 Version: 20.6.3.3 Version: 20.6.4.2 Version: 20.6.3.0.45 Version: 20.6.3.0.46 Version: 20.6.3.0.47 Version: 20.6.3.4 Version: 20.6.4.0.21 Version: 20.6.5.1.10 Version: 20.6.5.1.11 Version: 20.6.5.1.7 Version: 20.6.5.1.9 Version: 20.6.5.2.4 Version: 20.6.5.5 Version: 20.6.5.2.8 Version: 20.6.5.1.13 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.960Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-sdwan-lfi-OWLbKUGe", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20261", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-12T15:04:21.425909Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-12T15:04:33.809Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco SD-WAN vManage", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "17.2.6" }, { "status": "affected", "version": "17.2.7" }, { "status": "affected", "version": "17.2.8" }, { "status": "affected", "version": "17.2.9" }, { "status": "affected", "version": "17.2.10" }, { "status": "affected", "version": "17.2.4" }, { "status": "affected", "version": "17.2.5" }, { "status": "affected", "version": "18.3.1.1" }, { "status": "affected", "version": "18.3.3.1" }, { "status": "affected", "version": "18.3.3" }, { "status": "affected", "version": "18.3.4" }, { "status": "affected", "version": "18.3.5" }, { "status": "affected", "version": "18.3.7" }, { "status": "affected", "version": "18.3.8" }, { "status": "affected", "version": "18.3.6.1" }, { "status": "affected", "version": "18.3.1" }, { "status": "affected", "version": "18.3.0" }, { "status": "affected", "version": "18.4.0.1" }, { "status": "affected", "version": "18.4.3" }, { "status": "affected", "version": "18.4.302" }, { "status": "affected", "version": "18.4.303" }, { "status": "affected", "version": "18.4.4" }, { "status": "affected", "version": "18.4.5" }, { "status": "affected", "version": "18.4.0" }, { "status": "affected", "version": "18.4.1" }, { "status": "affected", "version": "18.4.6" }, { "status": "affected", "version": "19.2.0" }, { "status": "affected", "version": "19.2.097" }, { "status": "affected", "version": "19.2.099" }, { "status": "affected", "version": "19.2.1" }, { "status": "affected", "version": "19.2.2" }, { "status": "affected", "version": "19.2.3" }, { "status": "affected", "version": "19.2.31" }, { "status": "affected", "version": "19.2.929" }, { "status": "affected", "version": "19.2.4" }, { "status": "affected", "version": "20.1.1.1" }, { "status": "affected", "version": "20.1.12" }, { "status": "affected", "version": "20.1.1" }, { "status": "affected", "version": "20.1.2" }, { "status": "affected", "version": "20.1.3" }, { "status": "affected", "version": "19.3.0" }, { "status": "affected", "version": "19.1.0" }, { "status": "affected", "version": "18.2.0" }, { "status": "affected", "version": "20.3.1" }, { "status": "affected", "version": "20.3.2" }, { "status": "affected", "version": "20.3.2.1" }, { "status": "affected", "version": "20.3.3" }, { "status": "affected", "version": "20.3.3.1" }, { "status": "affected", "version": "20.3.4" }, { "status": "affected", "version": "20.3.4.1" }, { "status": "affected", "version": "20.3.4.2" }, { "status": "affected", "version": "20.3.5" }, { "status": "affected", "version": "20.3.6" }, { "status": "affected", "version": "20.3.7" }, { "status": "affected", "version": "20.3.7.1" }, { "status": "affected", "version": "20.3.4.3" }, { "status": "affected", "version": "20.3.5.1" }, { "status": "affected", "version": "20.3.7.2" }, { "status": "affected", "version": "20.3.8" }, { "status": "affected", "version": "20.4.1" }, { "status": "affected", "version": "20.4.1.1" }, { "status": "affected", "version": "20.4.1.2" }, { "status": "affected", "version": "20.4.2" }, { "status": "affected", "version": "20.4.2.2" }, { "status": "affected", "version": "20.4.2.1" }, { "status": "affected", "version": "20.4.2.3" }, { "status": "affected", "version": "20.5.1" }, { "status": "affected", "version": "20.5.1.2" }, { "status": "affected", "version": "20.5.1.1" }, { "status": "affected", "version": "20.6.1" }, { "status": "affected", "version": "20.6.1.1" }, { "status": "affected", "version": "20.6.2.1" }, { "status": "affected", "version": "20.6.2.2" }, { "status": "affected", "version": "20.6.2" }, { "status": "affected", "version": "20.6.3" }, { "status": "affected", "version": "20.6.3.1" }, { "status": "affected", "version": "20.6.4" }, { "status": "affected", "version": "20.6.5" }, { "status": "affected", "version": "20.6.5.1" }, { "status": "affected", "version": "20.6.1.2" }, { "status": "affected", "version": "20.6.3.2" }, { "status": "affected", "version": "20.6.4.1" }, { "status": "affected", "version": "20.6.5.2" }, { "status": "affected", "version": "20.6.5.4" }, { "status": "affected", "version": "20.6.3.3" }, { "status": "affected", "version": "20.6.4.2" }, { "status": "affected", "version": "20.6.3.0.45" }, { "status": "affected", "version": "20.6.3.0.46" }, { "status": "affected", "version": "20.6.3.0.47" }, { "status": "affected", "version": "20.6.3.4" }, { "status": "affected", "version": "20.6.4.0.21" }, { "status": "affected", "version": "20.6.5.1.10" }, { "status": "affected", "version": "20.6.5.1.11" }, { "status": "affected", "version": "20.6.5.1.7" }, { "status": "affected", "version": "20.6.5.1.9" }, { "status": "affected", "version": "20.6.5.2.4" }, { "status": "affected", "version": "20.6.5.5" }, { "status": "affected", "version": "20.6.5.2.8" }, { "status": "affected", "version": "20.6.5.1.13" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.\r\n\r This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:34.365Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-sdwan-lfi-OWLbKUGe", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe" } ], "source": { "advisory": "cisco-sa-sdwan-lfi-OWLbKUGe", "defects": [ "CSCwf75979" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20261", "datePublished": "2023-10-18T16:27:01.866Z", "dateReserved": "2022-10-27T18:47:50.373Z", "dateUpdated": "2025-06-12T15:04:33.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…