First published: Wed Aug 26 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to view potentially sensitive information on an affected device. The vulnerability is due to incorrect permissions within Apache configuration. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to view potentially sensitive information on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Vision Dynamic Signage Director | =6.2\(0\)-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3484 has a medium severity rating due to its potential to expose sensitive information.
To fix CVE-2020-3484, update Cisco Vision Dynamic Signage Director to the latest patched version.
Exploiting CVE-2020-3484 could allow an unauthenticated attacker to access sensitive information on the affected device.
CVE-2020-3484 affects Cisco Vision Dynamic Signage Director version 6.2(0)-sp2.
No, CVE-2020-3484 can be exploited by an unauthenticated, remote attacker.