First published: Fri Aug 04 2023(Updated: )
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to view arbitrary files on the affected system.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager | =17.2.4 | |
Cisco Catalyst SD-WAN Manager | =17.2.5 | |
Cisco Catalyst SD-WAN Manager | =17.2.6 | |
Cisco Catalyst SD-WAN Manager | =17.2.7 | |
Cisco Catalyst SD-WAN Manager | =17.2.8 | |
Cisco Catalyst SD-WAN Manager | =17.2.9 | |
Cisco Catalyst SD-WAN Manager | =17.2.10 | |
Cisco Catalyst SD-WAN Manager | =18.2.0 | |
Cisco Catalyst SD-WAN Manager | =18.3.0 | |
Cisco Catalyst SD-WAN Manager | =18.3.1 | |
Cisco Catalyst SD-WAN Manager | =18.3.1.1 | |
Cisco Catalyst SD-WAN Manager | =18.3.3 | |
Cisco Catalyst SD-WAN Manager | =18.3.3.1 | |
Cisco Catalyst SD-WAN Manager | =18.3.4 | |
Cisco Catalyst SD-WAN Manager | =18.3.5 | |
Cisco Catalyst SD-WAN Manager | =18.3.6.1 | |
Cisco Catalyst SD-WAN Manager | =18.3.7 | |
Cisco Catalyst SD-WAN Manager | =18.3.8 | |
Cisco Catalyst SD-WAN Manager | =18.4.0 | |
Cisco Catalyst SD-WAN Manager | =18.4.0.1 | |
Cisco Catalyst SD-WAN Manager | =18.4.1 | |
Cisco Catalyst SD-WAN Manager | =18.4.3 | |
Cisco Catalyst SD-WAN Manager | =18.4.4 | |
Cisco Catalyst SD-WAN Manager | =18.4.5 | |
Cisco Catalyst SD-WAN Manager | =18.4.302 | |
Cisco Catalyst SD-WAN Manager | =18.4.303 | |
Cisco Catalyst SD-WAN Manager | =19.1.0 | |
Cisco Catalyst SD-WAN Manager | =19.2.0 | |
Cisco Catalyst SD-WAN Manager | =19.2.1 | |
Cisco Catalyst SD-WAN Manager | =19.2.2 | |
Cisco Catalyst SD-WAN Manager | =19.2.3 | |
Cisco Catalyst SD-WAN Manager | =19.2.31 | |
Cisco Catalyst SD-WAN Manager | =19.2.097 | |
Cisco Catalyst SD-WAN Manager | =19.2.099 | |
Cisco Catalyst SD-WAN Manager | =19.2.929 | |
Cisco Catalyst SD-WAN Manager | =19.3.0 | |
Cisco Catalyst SD-WAN Manager | =20.1.1 | |
Cisco Catalyst SD-WAN Manager | =20.1.1.1 | |
Cisco Catalyst SD-WAN Manager | =20.1.12 | |
Cisco Catalyst SD-WAN Manager | =20.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26065 is a vulnerability in the web-based management interface of Cisco SD-WAN vManage Software that could allow an authenticated, remote attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system.
The severity of CVE-2020-26065 is medium with a CVSS score of 6.5.
CVE-2020-26065 affects Cisco Catalyst SD-WAN Manager versions 17.2.4 to 20.3.1.
The Common Weakness Enumeration (CWE) for CVE-2020-26065 is CWE-22.
To fix CVE-2020-26065, it is recommended to upgrade to a fixed version of Cisco Catalyst SD-WAN Manager software.