First published: Tue Nov 24 2020(Updated: )
The SD-WAN Orchestrator 3.3.2 prior to 3.3.2 P3 and 3.4.x prior to 3.4.4 does not apply correct input validation which allows for SQL-injection. An authenticated SD-WAN Orchestrator user may exploit a vulnerable API call using specially crafted SQL queries which may lead to unauthorized data access.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware VeloCloud Orchestrator | >=3.4.0<3.4.4 | |
VMware VeloCloud Orchestrator | =3.3.2 | |
VMware VeloCloud Orchestrator | =3.3.2-p1 | |
VMware VeloCloud Orchestrator | =3.3.2-p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3984 is rated as a critical vulnerability due to its potential for SQL injection and unauthorized data access.
To fix CVE-2020-3984, upgrade to SD-WAN Orchestrator version 3.3.2 P3 or 3.4.4 or later.
CVE-2020-3984 affects VMware SD-WAN Orchestrator versions 3.3.2 and 3.4.x prior to 3.4.4.
CVE-2020-3984 is an SQL injection vulnerability that arises from improper input validation.
CVE-2020-3984 requires an authenticated user to exploit the vulnerability through a vulnerable API call.