CVE-2020-3388Improper Authentication in Cisco Sd-wan Firmware

Severity
7.8HIGHNVD
EPSS
0.0%
top 85.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 16
Latest updateMay 24

Description

A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated to access the CLI. A successful exploit could allow the attacker to execute commands with root privileges.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDcisco/sd-wan_firmware18.4.019.2.2+2

🔴Vulnerability Details

2
GHSA
GHSA-g323-fq43-wfq6: A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to inject arbitrary commands that are execute2022-05-24
CVEList
Cisco SD-WAN vManage Software Command Injection Vulnerability2020-07-16

📋Vendor Advisories

1
Cisco
Cisco SD-WAN vManage Software Command Injection Vulnerability2020-07-15

💬Community

1
Bugzilla
CVE-2005-3388 PHP phpinfo() XSS attack2005-11-01