Lucene search

K
cve[email protected]CVE-2022-20830
HistoryOct 10, 2022 - 9:15 p.m.

CVE-2022-20830

2022-10-1021:15:10
CWE-306
web.nvd.nist.gov
23
4
cisco
sd-avc
vulnerability
authentication
remote attacker
gui
exploit
nvd
cve-2022-20830

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.5%

A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC without authentication. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server installations of Cisco vManage. An attacker could exploit this vulnerability by accessing the exposed GUI of Cisco SD-AVC. A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses.

Affected configurations

NVD
Node
ciscocatalyst_sd-wan_managerRange20.420.6.1
OR
ciscocatalyst_sd-wan_managerMatch20.7
OR
ciscosd-wan_vmanageRange18.420.3.4.1

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco SD-WAN vManage ",
    "versions": [
      {
        "version": "n/a",
        "status": "affected"
      }
    ]
  }
]

Social References

More

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.5%

Related for CVE-2022-20830