Cisco Catalyst Sd-Wan Manager vulnerabilities

67 known vulnerabilities affecting cisco/catalyst_sd-wan_manager.

Total CVEs
67
CISA KEV
2
actively exploited
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL6HIGH22MEDIUM39

Vulnerabilities

Page 2 of 4
CVE-2021-1466MEDIUMCVSS 5.4v17.2.4v17.2.5+36 more2024-11-15
CVE-2021-1466 [MEDIUM] CWE-20 CVE-2021-1466: A vulnerability in the vDaemon service of Cisco SD-WAN vManage Software could allow an authenti A vulnerability in the vDaemon service of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to cause a buffer overflow on an affected system, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete bounds checks for data that is provided to the vDaemon service of an affected system. An attacker
nvd
CVE-2021-1484MEDIUMCVSS 6.5v17.2.4v17.2.5+56 more2024-11-15
CVE-2021-1484 [MEDIUM] CWE-88 CVE-2021-1484: A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, re A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to inject arbitrary commands on an affected system and cause a denial of service (DoS) condition. This vulnerability is due to improper input validation of user-supplied input to the device template configuration. An attacker could exploit this
nvd
CVE-2021-1483MEDIUMCVSS 6.4v17.2.4v17.2.5+60 more2024-11-15
CVE-2021-1483 [MEDIUM] CWE-611 CVE-2021-1483: A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, re A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. This vulnerability is due to improper handling of XML External Entity (XXE) entries when the affected software parses certain XML files. An attacker could exploi
nvd
CVE-2021-1464MEDIUMCVSS 5.0v17.2.4v17.2.5+40 more2024-11-15
CVE-2021-1464 [MEDIUM] CWE-20 CVE-2021-1464: A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, remote attacker A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain restricted access to the configuration information of an affected system. This vulnerability exists because the affected software has insufficient input validation for certain commands. An attacker could exploit this v
nvd
CVE-2021-1482MEDIUMCVSS 6.4v17.2.4v17.2.5+62 more2024-11-15
CVE-2021-1482 [MEDIUM] CWE-20 CVE-2021-1482: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could al A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain access to sensitive information on an affected system. This vulnerability is due to insufficient authorization checks. An attacker could exploit this vulnerability by sending craf
nvd
CVE-2021-1470MEDIUMCVSS 4.9v17.2.4v17.2.5+47 more2024-11-15
CVE-2021-1470 [MEDIUM] CWE-20 CVE-2021-1470: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could al A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to improper input validation of SQL queries to an affected system. An attacker could exploit this vulnerability by authenticating to the ap
nvd
CVE-2021-1481MEDIUMCVSS 4.3v17.2.4v17.2.5+62 more2024-11-15
CVE-2021-1481 [MEDIUM] CWE-943 CVE-2021-1481: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could al A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct Cypher query language injection attacks on an affected system. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by
nvd
CVE-2021-1491MEDIUMCVSS 6.5v17.2.4v17.2.5+61 more2024-11-15
CVE-2021-1491 [MEDIUM] CWE-59 CVE-2021-1491: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could al A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying file system of the device. This vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the
nvd
CVE-2024-20475MEDIUMCVSS 5.4v20.6.0.18.3v20.6.0.18.4+100 more2024-09-25
CVE-2024-20475 [MEDIUM] CWE-79 CVE-2024-20475: A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cis A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-suppl
nvd
CVE-2023-20261MEDIUMCVSS 6.5v17.2.4v17.2.5+97 more2023-10-18
CVE-2023-20261 [MEDIUM] CWE-284 CVE-2023-20261: A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system. This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and is
nvd
CVE-2023-20252CRITICALCVSS 9.8v20.9.3.2v20.11.1.22023-09-27
CVE-2023-20252 [CRITICAL] CWE-862 CVE-2023-20252: A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manag A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manager Software could allow an unauthenticated, remote attacker to gain unauthorized access to the application as an arbitrary user. This vulnerability is due to improper authentication checks for SAML APIs. An attacker could exploit this vulnerability
nvd
CVE-2023-20262HIGHCVSS 7.5≥ 20.4, < 20.9.32023-09-27
CVE-2023-20262 [HIGH] CWE-399 CVE-2023-20262: A vulnerability in the SSH service of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, A vulnerability in the SSH service of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to cause a process crash, resulting in a DoS condition for SSH access only. This vulnerability does not prevent the system from continuing to function, and web UI access is not affected. This vulnerability is due to insufficient resource
nvd
CVE-2023-20253MEDIUMCVSS 5.5v20.7v20.8+2 more2023-09-27
CVE-2023-20253 [MEDIUM] CWE-286 CVE-2023-20253: A vulnerability in the command line interface (cli) management interface of Cisco SD-WAN vManage cou A vulnerability in the command line interface (cli) management interface of Cisco SD-WAN vManage could allow an authenticated, local attacker to bypass authorization and allow the attacker to roll back the configuration on vManage controllers and edge router device. This vulnerability is due to improper access control in the cli-management interface
nvd
CVE-2020-26064HIGHCVSS 8.1v17.2.4v17.2.5+38 more2023-08-04
CVE-2020-26064 [HIGH] CWE-611 CVE-2020-26064: A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by
nvd
CVE-2020-26065MEDIUMCVSS 6.5v17.2.4v17.2.5+38 more2023-08-04
CVE-2020-26065 [MEDIUM] CWE-22 CVE-2020-26065: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow a A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by se
nvd
CVE-2023-20214CRITICALCVSS 9.1≥ 20.6.4, < 20.6.4.2≥ 20.6.5, < 20.6.5.5+3 more2023-08-03
CVE-2023-20214 [CRITICAL] CWE-287 CVE-2023-20214: A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage so A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to gain read permissions or limited write permissions to the configuration of an affected Cisco SD-WAN vManage instance. This vulnerability is due to insufficient request validation when using t
nvd
CVE-2023-20098MEDIUMCVSS 6.0v20.112023-05-09
CVE-2023-20098 [MEDIUM] CWE-24 CVE-2023-20098: A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attac A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files. This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command co
nvd
CVE-2022-20830MEDIUMCVSS 5.3≥ 20.4, < 20.6.1v20.72022-10-10
CVE-2022-20830 [MEDIUM] CWE-306 CVE-2022-20830: A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Con A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC without authentication. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server instal
nvd
CVE-2022-20775HIGHCVSS 7.8KEVfixed in 20.6.3≥ 20.7, < 20.7.2+1 more2022-09-30
CVE-2022-20775 [HIGH] CWE-25 CVE-2022-20775: A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit cou
nvd
CVE-2022-20930MEDIUMCVSS 6.7v20.8v20.92022-09-30
CVE-2022-20930 [MEDIUM] CWE-88 CVE-2022-20930: A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful
nvd