First published: Thu Mar 23 2023(Updated: )
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. These actions could include modifying the system configuration and deleting accounts.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | <20.6.5 | |
Cisco SD-WAN | =20.8.0 | |
Cisco SD-WAN | =20.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20113 is a vulnerability in the web-based management interface of Cisco SD-WAN vManage Software that could allow a remote attacker to conduct a cross-site request forgery (CSRF) attack.
The severity of CVE-2023-20113 is high with a CVSS score of 8.1.
CVE-2023-20113 affects Cisco SD-WAN vManage Software by exposing it to cross-site request forgery (CSRF) attacks.
An attacker can exploit CVE-2023-20113 by performing a cross-site request forgery (CSRF) attack on the vulnerable web-based management interface of Cisco SD-WAN vManage Software.
Yes, Cisco has released a security advisory with instructions on how to mitigate the vulnerability. Please refer to the Cisco Security Advisory for more information.