First published: Wed Sep 27 2023(Updated: )
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage | <20.6.6 | |
Cisco SD-WAN vManage | >=20.7<20.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20179 is a vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, that allows an authenticated, remote attacker to inject HTML content.
CVE-2023-20179 affects Cisco SD-WAN vManage versions up to 20.6.6 and versions between 20.7 and 20.10.
The severity of CVE-2023-20179 is medium with a CVSS score of 5.4.
An attacker can exploit CVE-2023-20179 by injecting HTML content through improper validation of user-supplied data in element fields.
Yes, Cisco has released a security advisory and recommended software updates to address CVE-2023-20179. Please refer to the official Cisco Security Advisory for more information.