Lucene search

K
cvelistCiscoCVELIST:CVE-2023-20261
HistoryOct 18, 2023 - 4:27 p.m.

CVE-2023-20261

2023-10-1816:27:01
cisco
www.cve.org
3
cisco catalyst sd-wan manager
vulnerability
authenticated
remote attacker
retrieve arbitrary files
linux file system

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

27.6%

A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.

This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco SD-WAN vManage",
    "versions": [
      {
        "version": "17.2.6",
        "status": "affected"
      },
      {
        "version": "17.2.7",
        "status": "affected"
      },
      {
        "version": "17.2.8",
        "status": "affected"
      },
      {
        "version": "17.2.9",
        "status": "affected"
      },
      {
        "version": "17.2.10",
        "status": "affected"
      },
      {
        "version": "17.2.4",
        "status": "affected"
      },
      {
        "version": "17.2.5",
        "status": "affected"
      },
      {
        "version": "18.3.1.1",
        "status": "affected"
      },
      {
        "version": "18.3.3.1",
        "status": "affected"
      },
      {
        "version": "18.3.3",
        "status": "affected"
      },
      {
        "version": "18.3.4",
        "status": "affected"
      },
      {
        "version": "18.3.5",
        "status": "affected"
      },
      {
        "version": "18.3.7",
        "status": "affected"
      },
      {
        "version": "18.3.8",
        "status": "affected"
      },
      {
        "version": "18.3.6.1",
        "status": "affected"
      },
      {
        "version": "18.3.1",
        "status": "affected"
      },
      {
        "version": "18.3.0",
        "status": "affected"
      },
      {
        "version": "18.4.0.1",
        "status": "affected"
      },
      {
        "version": "18.4.3",
        "status": "affected"
      },
      {
        "version": "18.4.302",
        "status": "affected"
      },
      {
        "version": "18.4.303",
        "status": "affected"
      },
      {
        "version": "18.4.4",
        "status": "affected"
      },
      {
        "version": "18.4.5",
        "status": "affected"
      },
      {
        "version": "18.4.0",
        "status": "affected"
      },
      {
        "version": "18.4.1",
        "status": "affected"
      },
      {
        "version": "18.4.6",
        "status": "affected"
      },
      {
        "version": "19.2.0",
        "status": "affected"
      },
      {
        "version": "19.2.097",
        "status": "affected"
      },
      {
        "version": "19.2.099",
        "status": "affected"
      },
      {
        "version": "19.2.1",
        "status": "affected"
      },
      {
        "version": "19.2.2",
        "status": "affected"
      },
      {
        "version": "19.2.3",
        "status": "affected"
      },
      {
        "version": "19.2.31",
        "status": "affected"
      },
      {
        "version": "19.2.929",
        "status": "affected"
      },
      {
        "version": "19.2.4",
        "status": "affected"
      },
      {
        "version": "20.1.1.1",
        "status": "affected"
      },
      {
        "version": "20.1.12",
        "status": "affected"
      },
      {
        "version": "20.1.1",
        "status": "affected"
      },
      {
        "version": "20.1.2",
        "status": "affected"
      },
      {
        "version": "20.1.3",
        "status": "affected"
      },
      {
        "version": "19.3.0",
        "status": "affected"
      },
      {
        "version": "19.1.0",
        "status": "affected"
      },
      {
        "version": "18.2.0",
        "status": "affected"
      },
      {
        "version": "20.3.1",
        "status": "affected"
      },
      {
        "version": "20.3.2",
        "status": "affected"
      },
      {
        "version": "20.3.2.1",
        "status": "affected"
      },
      {
        "version": "20.3.3",
        "status": "affected"
      },
      {
        "version": "20.3.3.1",
        "status": "affected"
      },
      {
        "version": "20.3.4",
        "status": "affected"
      },
      {
        "version": "20.3.4.1",
        "status": "affected"
      },
      {
        "version": "20.3.4.2",
        "status": "affected"
      },
      {
        "version": "20.3.5",
        "status": "affected"
      },
      {
        "version": "20.3.6",
        "status": "affected"
      },
      {
        "version": "20.3.7",
        "status": "affected"
      },
      {
        "version": "20.3.7.1",
        "status": "affected"
      },
      {
        "version": "20.3.4.3",
        "status": "affected"
      },
      {
        "version": "20.3.5.1",
        "status": "affected"
      },
      {
        "version": "20.3.7.2",
        "status": "affected"
      },
      {
        "version": "20.3.8",
        "status": "affected"
      },
      {
        "version": "20.4.1",
        "status": "affected"
      },
      {
        "version": "20.4.1.1",
        "status": "affected"
      },
      {
        "version": "20.4.1.2",
        "status": "affected"
      },
      {
        "version": "20.4.2",
        "status": "affected"
      },
      {
        "version": "20.4.2.2",
        "status": "affected"
      },
      {
        "version": "20.4.2.1",
        "status": "affected"
      },
      {
        "version": "20.4.2.3",
        "status": "affected"
      },
      {
        "version": "20.5.1",
        "status": "affected"
      },
      {
        "version": "20.5.1.2",
        "status": "affected"
      },
      {
        "version": "20.5.1.1",
        "status": "affected"
      },
      {
        "version": "20.6.1",
        "status": "affected"
      },
      {
        "version": "20.6.1.1",
        "status": "affected"
      },
      {
        "version": "20.6.2.1",
        "status": "affected"
      },
      {
        "version": "20.6.2.2",
        "status": "affected"
      },
      {
        "version": "20.6.2",
        "status": "affected"
      },
      {
        "version": "20.6.3",
        "status": "affected"
      },
      {
        "version": "20.6.3.1",
        "status": "affected"
      },
      {
        "version": "20.6.4",
        "status": "affected"
      },
      {
        "version": "20.6.5",
        "status": "affected"
      },
      {
        "version": "20.6.5.1",
        "status": "affected"
      },
      {
        "version": "20.6.1.2",
        "status": "affected"
      },
      {
        "version": "20.6.3.2",
        "status": "affected"
      },
      {
        "version": "20.6.4.1",
        "status": "affected"
      },
      {
        "version": "20.6.5.2",
        "status": "affected"
      },
      {
        "version": "20.6.5.4",
        "status": "affected"
      },
      {
        "version": "20.6.3.3",
        "status": "affected"
      },
      {
        "version": "20.6.4.2",
        "status": "affected"
      },
      {
        "version": "20.6.3.0.45",
        "status": "affected"
      },
      {
        "version": "20.6.3.0.46",
        "status": "affected"
      },
      {
        "version": "20.6.3.0.47",
        "status": "affected"
      },
      {
        "version": "20.6.3.4",
        "status": "affected"
      },
      {
        "version": "20.6.4.0.21",
        "status": "affected"
      },
      {
        "version": "20.6.5.1.10",
        "status": "affected"
      },
      {
        "version": "20.6.5.1.11",
        "status": "affected"
      },
      {
        "version": "20.6.5.1.7",
        "status": "affected"
      },
      {
        "version": "20.6.5.1.9",
        "status": "affected"
      },
      {
        "version": "20.6.5.2.4",
        "status": "affected"
      },
      {
        "version": "20.6.5.5",
        "status": "affected"
      },
      {
        "version": "20.6.5.2.8",
        "status": "affected"
      },
      {
        "version": "20.6.5.1.13",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0.001

Percentile

27.6%

Related for CVELIST:CVE-2023-20261