ID CVE-2020-26084 Type cve Reporter cve@mitre.org Modified 2020-11-19T15:12:00
Description
A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device. The vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
{"id": "CVE-2020-26084", "bulletinFamily": "NVD", "title": "CVE-2020-26084", "description": "A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device. The vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.", "published": "2020-11-06T19:15:00", "modified": "2020-11-19T15:12:00", "cvss": {"score": 5.5, "vector": "AV:N/AC:L/Au:S/C:N/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26084", "reporter": "cve@mitre.org", "references": ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-eff-incperm-9E6h4yBz"], "cvelist": ["CVE-2020-26084"], "type": "cve", "lastseen": "2021-02-02T07:37:04", "edition": 5, "viewCount": 14, "enchantments": {"dependencies": {"references": [{"type": "cisco", "idList": ["CISCO-SA-EFF-INCPERM-9E6H4YBZ"]}], "modified": "2021-02-02T07:37:04", "rev": 2}, "score": {"value": 4.6, "vector": "NONE", "modified": "2021-02-02T07:37:04", "rev": 2}, "vulnersScore": 4.6}, "cpe": [], "affectedSoftware": [{"cpeName": "cisco:edge_fog_fabric", "name": "cisco edge fog fabric", "operator": "lt", "version": "1.7.4"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:cisco:edge_fog_fabric:1.7.4:*:*:*:*:*:*:*", "versionEndExcluding": "1.7.4", "vulnerable": true}], "operator": "OR"}]}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6}, "cpe23": [], "cwe": ["CWE-668"], "scheme": null, "extraReferences": [{"name": "20201104 Cisco Edge Fog Fabric Resource Exposure Vulnerability", "refsource": "CISCO", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-eff-incperm-9E6h4yBz"}], "immutableFields": []}
{"cisco": [{"lastseen": "2020-12-24T11:40:23", "bulletinFamily": "software", "cvelist": ["CVE-2020-26084"], "description": "A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device.\n\nThe vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.\n\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\n\nThis advisory is available at the following link:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-eff-incperm-9E6h4yBz [\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-eff-incperm-9E6h4yBz\"]", "modified": "2020-11-04T16:00:00", "published": "2020-11-04T16:00:00", "id": "CISCO-SA-EFF-INCPERM-9E6H4YBZ", "href": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-eff-incperm-9E6h4yBz", "type": "cisco", "title": "Cisco Edge Fog Fabric Resource Exposure Vulnerability", "cvss": {"score": 6.5, "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}}]}