CVE-2020-3437Link Following in Cisco Sd-wan Firmware

CWE-59Link Following4 documents4 sources
Severity
6.5MEDIUMNVD
EPSS
1.2%
top 20.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 16
Latest updateMay 24

Description

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-hrwv-7vp5-r8pf: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary2022-05-24
CVEList
Cisco SD-WAN vManage Software Information Disclosure Vulnerability2020-07-16

📋Vendor Advisories

1
Cisco
Cisco SD-WAN vManage Software Information Disclosure Vulnerability2020-07-15
CVE-2020-3437 — Link Following in Cisco Sd-wan Firmware | cvebase