Cisco Sd-Wan Vmanage vulnerabilities
61 known vulnerabilities affecting cisco/cisco_sd-wan_vmanage.
Total CVEs
61
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL6HIGH18MEDIUM37
Vulnerabilities
Page 1 of 4
CVE-2023-20261MEDIUMCVSS 6.5v17.2.6v17.2.7+97 more2023-10-18
CVE-2023-20261 [MEDIUM] CWE-284 CVE-2023-20261: A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.
This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and is
cvelistv5nvd
CVE-2023-20252CRITICALCVSS 9.8v20.9.3.2v20.11.1.22023-09-27
CVE-2023-20252 [CRITICAL] CWE-862 CVE-2023-20252: A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manag
A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manager Software could allow an unauthenticated, remote attacker to gain unauthorized access to the application as an arbitrary user.
This vulnerability is due to improper authentication checks for SAML APIs. An attacker could exploit this vulnerability
cvelistv5nvd
CVE-2023-20034HIGHCVSS 7.5v17.2.6v17.2.7+56 more2023-09-27
CVE-2023-20034 [HIGH] CWE-798 CVE-2023-20034: Vulnerability in the Elasticsearch database used in the of Cisco SD-WAN vManage software could allow
Vulnerability in the Elasticsearch database used in the of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to access the Elasticsearch configuration database of an affected device with the privileges of the elasticsearch user.
These vulnerability is due to the presence of a static username and password configured on the v
cvelistv5nvd
CVE-2023-20262HIGHCVSS 7.5v17.2.6v17.2.7+73 more2023-09-27
CVE-2023-20262 [MEDIUM] CWE-399 CVE-2023-20262: A vulnerability in the SSH service of Cisco Catalyst SD-WAN Manager could allow an unauthenticated,
A vulnerability in the SSH service of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to cause a process crash, resulting in a DoS condition for SSH access only. This vulnerability does not prevent the system from continuing to function, and web UI access is not affected.
This vulnerability is due to insufficient resourc
cvelistv5nvd
CVE-2023-20254HIGHCVSS 8.8v17.2.6v17.2.7+98 more2023-09-27
CVE-2023-20254 [HIGH] CWE-732 CVE-2023-20254: A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant f
A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability requires the multi-tenant feature to be enabled.
This vulnerability is due to insu
cvelistv5nvd
CVE-2023-20253MEDIUMCVSS 5.5v17.2.6v17.2.7+69 more2023-09-27
CVE-2023-20253 [HIGH] CWE-286 CVE-2023-20253: A vulnerability in the command line interface (cli) management interface of Cisco SD-WAN vManage cou
A vulnerability in the command line interface (cli) management interface of Cisco SD-WAN vManage could allow an authenticated, local attacker to bypass authorization and allow the attacker to roll back the configuration on vManage controllers and edge router device.
This vulnerability is due to improper access control in the cli-management interface o
cvelistv5nvd
CVE-2023-20179MEDIUMCVSS 5.4v20.3.1v20.3.2+73 more2023-09-27
CVE-2023-20179 [MEDIUM] CWE-80 CVE-2023-20179: A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cis
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content.
This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious cont
cvelistv5nvd
CVE-2020-26064HIGHCVSS 8.1v17.2.6v17.2.7+38 more2023-08-04
CVE-2020-26064 [HIGH] CWE-611 CVE-2020-26064: A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote
A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.
The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by
cvelistv5nvd
CVE-2020-26065MEDIUMCVSS 6.5v17.2.6v17.2.7+38 more2023-08-04
CVE-2020-26065 [MEDIUM] CWE-22 CVE-2020-26065: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow a
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system.
The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by se
cvelistv5nvd
CVE-2023-20214CRITICALCVSS 9.1v20.6.4v20.6.5+34 more2023-08-03
CVE-2023-20214 [CRITICAL] CWE-287 CVE-2023-20214: A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage so
A vulnerability in the request authentication validation for the REST API of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to gain read permissions or limited write permissions to the configuration of an affected Cisco SD-WAN vManage instance.
This vulnerability is due to insufficient request validation when using t
cvelistv5nvd
CVE-2023-20098MEDIUMCVSS 6.0v20.9.1v20.9.22023-05-09
CVE-2023-20098 [MEDIUM] CWE-24 CVE-2023-20098: A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attac
A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files.
This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command co
cvelistv5nvd
CVE-2023-20113HIGHCVSS 8.1vn/a2023-03-23
CVE-2023-20113 [MEDIUM] CWE-352 CVE-2023-20113: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow a
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could
cvelistv5nvd
CVE-2022-20830MEDIUMCVSS 5.3vn/a2022-10-10
CVE-2022-20830 [MEDIUM] CWE-306 CVE-2022-20830: A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Con
A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC without authentication. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server instal
cvelistv5nvd
CVE-2022-20930MEDIUMCVSS 6.7vn/a2022-09-30
CVE-2022-20930 [MEDIUM] CWE-88 CVE-2022-20930: A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful
cvelistv5nvd
CVE-2022-20844MEDIUMCVSS 5.3vn/a2022-09-30
CVE-2022-20844 [MEDIUM] CWE-798 CVE-2022-20844: A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Con
A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC using a default static username and password combination. This vulnerability exists because the GUI is accessible on self-managed cloud in
cvelistv5nvd
CVE-2022-20696HIGHCVSS 8.8vn/a2022-09-08
CVE-2022-20696 [HIGH] CWE-284 CVE-2022-20696: A vulnerability in the binding configuration of Cisco SD-WAN vManage Software containers could allow
A vulnerability in the binding configuration of Cisco SD-WAN vManage Software containers could allow an unauthenticated, adjacent attacker who has access to the VPN0 logical network to also access the messaging service ports on an affected system. This vulnerability exists because the messaging server container ports on an affected system lack suffici
cvelistv5nvd
CVE-2022-20734MEDIUMCVSS 4.4vn/a2022-05-04
CVE-2022-20734 [MEDIUM] CWE-497 CVE-2022-20734: A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, local attacker to vie
A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, local attacker to view sensitive information on an affected system. This vulnerability is due to insufficient file system restrictions. An authenticated attacker with netadmin privileges could exploit this vulnerability by accessing the vshell of an affected system. A suc
cvelistv5nvd
CVE-2022-20739HIGHCVSS 7.3vn/a2022-04-15
CVE-2022-20739 [HIGH] CWE-269 CVE-2022-20739: A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local atta
A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected system as a low-privileged user to exploit this vulnerability. This vulnerability exists because a file leveraged
cvelistv5nvd
CVE-2022-20735MEDIUMCVSS 6.5vn/a2022-04-15
CVE-2022-20735 [MEDIUM] CWE-352 CVE-2022-20735: A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow a
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could
cvelistv5nvd
CVE-2022-20747MEDIUMCVSS 6.5vn/a2022-04-15
CVE-2022-20747 [MEDIUM] CWE-202 CVE-2022-20747: A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, re
A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API
cvelistv5nvd
1 / 4Next →