Severity
7.5HIGH
EPSS
0.4%
top 38.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 27

Description

Vulnerability in the Elasticsearch database used in the of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to access the Elasticsearch configuration database of an affected device with the privileges of the elasticsearch user. These vulnerability is due to the presence of a static username and password configured on the vManage. An attacker could exploit this vulnerability by sending a crafted HTTP request to a reachable vManage on port 9200. A successful exploit co

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5cisco/cisco_sd-wan_vmanage58 versions+57
NVDcisco/sd-wan20.320.3.4+2

Patches

🔴Vulnerability Details

2
CVEList
CVE-2023-20034: Vulnerability in the Elasticsearch database used in the of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to access the2023-09-27
GHSA
GHSA-vph8-3839-qfq3: Vulnerability in the Elasticsearch database used in the of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to access the2023-09-27

📋Vendor Advisories

1
Cisco
Cisco Catalyst SD-WAN Manager Vulnerabilities2023-09-27