First published: Fri Nov 06 2020(Updated: )
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization and modify the configuration of an affected system. The vulnerability is due to insufficient authorization checking on an affected system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to gain privileges beyond what would normally be authorized for their configured user authorization level. This could allow the attacker to modify the configuration of an affected system.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager | =20.3.1 | |
Cisco SD-WAN vManage | <=20.1.12 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanuafw-ZHkdGGEy
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3592 is a vulnerability in the web-based management interface of Cisco SD-WAN vManage Software that could allow an authenticated, remote attacker to bypass authorization and modify the configuration of an affected system.
CVE-2020-3592 has a severity rating of 6.5 out of 10 (medium severity).
The affected software versions are Cisco Catalyst SD-WAN Manager 20.3.1 and Cisco SD-WAN vManage up to and including version 20.1.12.
The vulnerability in CVE-2020-3592 is due to insufficient authorization checking on an affected system.
To fix CVE-2020-3592, Cisco recommends upgrading to a fixed software version as described in the Cisco Security Advisory.