Lucene search

K
nvd[email protected]NVD:CVE-2020-26064
HistoryAug 04, 2023 - 9:15 p.m.

CVE-2020-26064

2023-08-0421:15:09
CWE-611
web.nvd.nist.gov
cisco sd-wan
vmanage software
vulnerability
web ui
xml
exploit
remote attacker

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%

A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.
The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.

Affected configurations

NVD
Node
ciscocatalyst_sd-wan_managerMatch17.2.4
OR
ciscocatalyst_sd-wan_managerMatch17.2.5
OR
ciscocatalyst_sd-wan_managerMatch17.2.6
OR
ciscocatalyst_sd-wan_managerMatch17.2.7
OR
ciscocatalyst_sd-wan_managerMatch17.2.8
OR
ciscocatalyst_sd-wan_managerMatch17.2.9
OR
ciscocatalyst_sd-wan_managerMatch17.2.10
OR
ciscocatalyst_sd-wan_managerMatch18.2.0
OR
ciscocatalyst_sd-wan_managerMatch18.3.0
OR
ciscocatalyst_sd-wan_managerMatch18.3.1
OR
ciscocatalyst_sd-wan_managerMatch18.3.1.1
OR
ciscocatalyst_sd-wan_managerMatch18.3.3
OR
ciscocatalyst_sd-wan_managerMatch18.3.3.1
OR
ciscocatalyst_sd-wan_managerMatch18.3.4
OR
ciscocatalyst_sd-wan_managerMatch18.3.5
OR
ciscocatalyst_sd-wan_managerMatch18.3.6.1
OR
ciscocatalyst_sd-wan_managerMatch18.3.7
OR
ciscocatalyst_sd-wan_managerMatch18.3.8
OR
ciscocatalyst_sd-wan_managerMatch18.4.0
OR
ciscocatalyst_sd-wan_managerMatch18.4.0.1
OR
ciscocatalyst_sd-wan_managerMatch18.4.1
OR
ciscocatalyst_sd-wan_managerMatch18.4.3
OR
ciscocatalyst_sd-wan_managerMatch18.4.4
OR
ciscocatalyst_sd-wan_managerMatch18.4.5
OR
ciscocatalyst_sd-wan_managerMatch18.4.302
OR
ciscocatalyst_sd-wan_managerMatch18.4.303
OR
ciscocatalyst_sd-wan_managerMatch19.1.0
OR
ciscocatalyst_sd-wan_managerMatch19.2.0
OR
ciscocatalyst_sd-wan_managerMatch19.2.1
OR
ciscocatalyst_sd-wan_managerMatch19.2.2
OR
ciscocatalyst_sd-wan_managerMatch19.2.3
OR
ciscocatalyst_sd-wan_managerMatch19.2.31
OR
ciscocatalyst_sd-wan_managerMatch19.2.097
OR
ciscocatalyst_sd-wan_managerMatch19.2.099
OR
ciscocatalyst_sd-wan_managerMatch19.2.929
OR
ciscocatalyst_sd-wan_managerMatch19.3.0
OR
ciscocatalyst_sd-wan_managerMatch20.1.1
OR
ciscocatalyst_sd-wan_managerMatch20.1.1.1
OR
ciscocatalyst_sd-wan_managerMatch20.1.12
OR
ciscocatalyst_sd-wan_managerMatch20.3.1

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.9%

Related for NVD:CVE-2020-26064