CVE-2020-3401Path Traversal in Cisco Sd-wan Firmware

CWE-22Path Traversal4 documents4 sources
Severity
6.5MEDIUMNVD
EPSS
0.1%
top 80.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 16
Latest updateMay 24

Description

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to the affected system. A successful exploit could allow the atta

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-4xh3-cv46-pph4: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path t2022-05-24
CVEList
Cisco SD-WAN vManage Software Path Traversal Vulnerability2020-07-16

📋Vendor Advisories

1
Cisco
Cisco SD-WAN vManage Software Path Traversal Vulnerability2020-07-15
CVE-2020-3401 — Path Traversal in Cisco Sd-wan Firmware | cvebase