First published: Mon Nov 18 2024(Updated: )
A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26066 has a CVSS score indicating it is a high-severity vulnerability.
To fix CVE-2020-26066, apply the latest patches provided by Cisco for the SD-WAN vManage Software.
Any organization using Cisco SD-WAN vManage Software is affected by CVE-2020-26066.
CVE-2020-26066 allows an authenticated, remote attacker to gain unauthorized read and write access to sensitive data.
CVE-2020-26066 is caused by improper handling of XML External Entity (XXE) entries in the Cisco SD-WAN vManage Software.