First published: Tue Nov 24 2020(Updated: )
The SD-WAN Orchestrator 3.3.2 prior to 3.3.2 P3, 3.4.x prior to 3.4.4, and 4.0.x prior to 4.0.1 allows for executing files through directory traversal. An authenticated SD-WAN Orchestrator user is able to traversal directories which may lead to code execution of files.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware VeloCloud Orchestrator | >=3.4.0<3.4.4 | |
VMware VeloCloud Orchestrator | >=4.0.0<4.0.1 | |
VMware VeloCloud Orchestrator | =3.3.2 | |
VMware VeloCloud Orchestrator | =3.3.2-p1 | |
VMware VeloCloud Orchestrator | =3.3.2-p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4000 is classified as a critical vulnerability due to the potential for code execution via directory traversal.
To mitigate CVE-2020-4000, upgrade the SD-WAN Orchestrator to versions 3.3.2 P3, 3.4.4, or 4.0.1 or later.
CVE-2020-4000 affects SD-WAN Orchestrator versions prior to 3.3.2 P3, 3.4.x prior to 3.4.4, and 4.0.x prior to 4.0.1.
CVE-2020-4000 enables authenticated users to execute arbitrary files and potentially harmful code on the server.
Yes, an attacker must have authenticated access to exploit CVE-2020-4000 through directory traversal.