Lucene search

K
cvelistCiscoCVELIST:CVE-2023-20179
HistorySep 27, 2023 - 5:24 p.m.

CVE-2023-20179

2023-09-2717:24:32
cisco
www.cve.org
4
cisco
catalyst
sd-wan manager
html injection
web interface
vulnerability
user-supplied data
element fields
browser-based attacks

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

21.3%

A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content.

This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco SD-WAN vManage",
    "versions": [
      {
        "version": "20.3.1",
        "status": "affected"
      },
      {
        "version": "20.3.2",
        "status": "affected"
      },
      {
        "version": "20.3.2.1",
        "status": "affected"
      },
      {
        "version": "20.3.3",
        "status": "affected"
      },
      {
        "version": "20.3.3.1",
        "status": "affected"
      },
      {
        "version": "20.3.4",
        "status": "affected"
      },
      {
        "version": "20.3.4.1",
        "status": "affected"
      },
      {
        "version": "20.3.4.2",
        "status": "affected"
      },
      {
        "version": "20.3.5",
        "status": "affected"
      },
      {
        "version": "20.3.6",
        "status": "affected"
      },
      {
        "version": "20.3.7",
        "status": "affected"
      },
      {
        "version": "20.3.7.1",
        "status": "affected"
      },
      {
        "version": "20.3.4.3",
        "status": "affected"
      },
      {
        "version": "20.3.5.1",
        "status": "affected"
      },
      {
        "version": "20.3.7.2",
        "status": "affected"
      },
      {
        "version": "20.4.1",
        "status": "affected"
      },
      {
        "version": "20.4.1.1",
        "status": "affected"
      },
      {
        "version": "20.4.1.2",
        "status": "affected"
      },
      {
        "version": "20.4.2",
        "status": "affected"
      },
      {
        "version": "20.4.2.2",
        "status": "affected"
      },
      {
        "version": "20.4.2.1",
        "status": "affected"
      },
      {
        "version": "20.4.2.3",
        "status": "affected"
      },
      {
        "version": "20.5.1",
        "status": "affected"
      },
      {
        "version": "20.5.1.2",
        "status": "affected"
      },
      {
        "version": "20.5.1.1",
        "status": "affected"
      },
      {
        "version": "20.6.1",
        "status": "affected"
      },
      {
        "version": "20.6.1.1",
        "status": "affected"
      },
      {
        "version": "20.6.2.1",
        "status": "affected"
      },
      {
        "version": "20.6.2.2",
        "status": "affected"
      },
      {
        "version": "20.6.2",
        "status": "affected"
      },
      {
        "version": "20.6.3",
        "status": "affected"
      },
      {
        "version": "20.6.3.1",
        "status": "affected"
      },
      {
        "version": "20.6.4",
        "status": "affected"
      },
      {
        "version": "20.6.5",
        "status": "affected"
      },
      {
        "version": "20.6.5.1",
        "status": "affected"
      },
      {
        "version": "20.6.1.2",
        "status": "affected"
      },
      {
        "version": "20.6.3.2",
        "status": "affected"
      },
      {
        "version": "20.6.4.1",
        "status": "affected"
      },
      {
        "version": "20.6.5.2",
        "status": "affected"
      },
      {
        "version": "20.6.5.4",
        "status": "affected"
      },
      {
        "version": "20.6.3.3",
        "status": "affected"
      },
      {
        "version": "20.6.4.2",
        "status": "affected"
      },
      {
        "version": "20.6.3.0.45",
        "status": "affected"
      },
      {
        "version": "20.6.3.0.46",
        "status": "affected"
      },
      {
        "version": "20.6.3.0.47",
        "status": "affected"
      },
      {
        "version": "20.6.3.4",
        "status": "affected"
      },
      {
        "version": "20.6.4.0.21",
        "status": "affected"
      },
      {
        "version": "20.6.5.1.10",
        "status": "affected"
      },
      {
        "version": "20.6.5.1.7",
        "status": "affected"
      },
      {
        "version": "20.6.5.1.9",
        "status": "affected"
      },
      {
        "version": "20.6.5.2.4",
        "status": "affected"
      },
      {
        "version": "20.6.5.5",
        "status": "affected"
      },
      {
        "version": "20.7.1",
        "status": "affected"
      },
      {
        "version": "20.7.1.1",
        "status": "affected"
      },
      {
        "version": "20.7.2",
        "status": "affected"
      },
      {
        "version": "20.8.1",
        "status": "affected"
      },
      {
        "version": "20.9.1",
        "status": "affected"
      },
      {
        "version": "20.9.2",
        "status": "affected"
      },
      {
        "version": "20.9.2.1",
        "status": "affected"
      },
      {
        "version": "20.9.3",
        "status": "affected"
      },
      {
        "version": "20.9.3.1",
        "status": "affected"
      },
      {
        "version": "20.9.2.3",
        "status": "affected"
      },
      {
        "version": "20.9.3.0.12",
        "status": "affected"
      },
      {
        "version": "20.9.3.0.16",
        "status": "affected"
      },
      {
        "version": "20.9.3.0.17",
        "status": "affected"
      },
      {
        "version": "20.9.3.0.18",
        "status": "affected"
      },
      {
        "version": "20.9.3.2",
        "status": "affected"
      },
      {
        "version": "20.9.3.2_LI_Images",
        "status": "affected"
      },
      {
        "version": "20.9.4",
        "status": "affected"
      },
      {
        "version": "20.10.1",
        "status": "affected"
      },
      {
        "version": "20.10.1.1",
        "status": "affected"
      },
      {
        "version": "20.10.1.2",
        "status": "affected"
      },
      {
        "version": "20.11.1",
        "status": "affected"
      },
      {
        "version": "20.11.1.1",
        "status": "affected"
      },
      {
        "version": "20.11.1.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

21.3%

Related for CVELIST:CVE-2023-20179