CVE-2023-20214

Severity
9.1CRITICAL
EPSS
0.1%
top 64.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 3
Latest updateAug 4

Description

A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to gain read permissions or limited write permissions to the configuration of an affected Cisco SD-WAN vManage instance. This vulnerability is due to insufficient request validation when using the REST API feature. An attacker could exploit this vulnerability by sending a crafted API request to an affected vManage instance. A successful exploi

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2

Affected Packages3 packages

NVDcisco/sd-wan_vmanage20.1020.10.1.2
CVEListV5cisco/cisco_sd-wan_vmanage36 versions+35
NVDcisco/catalyst_sd-wan_manager20.6.420.6.4.2+4

🔴Vulnerability Details

2
GHSA
GHSA-m62w-7qr8-gjmc: A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote atta2023-08-04
CVEList
CVE-2023-20214: A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote atta2023-08-03

📋Vendor Advisories

1
Cisco
Cisco SD-WAN vManage Unauthenticated REST API Access Vulnerability2023-07-12
CVE-2023-20214 (CRITICAL CVSS 9.1) | A vulnerability in the request auth | cvebase.io