First published: Thu Jul 16 2020(Updated: )
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the filesystem of the underlying operating system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sd-wan Firmware | <19.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-3437.
The title of this vulnerability is 'A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow a…'
The severity of CVE-2020-3437 is medium with a severity value of 6.5.
CVE-2020-3437 allows an authenticated, remote attacker to read arbitrary files on the underlying filesystem of the device.
Versions up to exclusive 19.2.3 of Cisco SD-WAN Firmware are affected by CVE-2020-3437.
The CWE ID associated with CVE-2020-3437 is CWE-59.
You can find more information about CVE-2020-3437 at the following URLs: [http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html](http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html) and [https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanwebid-5QWMcCvt](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanwebid-5QWMcCvt).