CVE-2020-26065Path Traversal in Cisco Sd-wan Vmanage

CWE-22Path Traversal4 documents4 sources
Severity
6.5MEDIUMNVD
EPSS
0.3%
top 48.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 4

Description

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attac

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5cisco/cisco_sd-wan_vmanage40 versions+39
NVDcisco/catalyst_sd-wan_manager40 versions+39

🔴Vulnerability Details

2
CVEList
CVE-2020-26065: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path t2023-08-04
GHSA
GHSA-5g4q-wx2h-8ppg: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path t2023-08-04

📋Vendor Advisories

1
Cisco
Cisco SD-WAN vManage Software Path Traversal Vulnerability2020-11-04
CVE-2020-26065 — Path Traversal in Cisco Sd-wan Vmanage | cvebase