CVE-2020-3592

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization and modify the configuration of an affected system. The vulnerability is due to insufficient authorization checking on an affected system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to gain privileges beyond what would normally be authorized for their configured user authorization level. This could allow the attacker to modify the configuration of an affected system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*

History

16 Oct 2023, 16:35

Type Values Removed Values Added
First Time Cisco catalyst Sd-wan Manager
CPE cpe:2.3:a:cisco:sd-wan_vmanage:20.3.1:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*

Information

Published : 2020-11-06 19:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-3592

Mitre link : CVE-2020-3592

CVE.ORG link : CVE-2020-3592


JSON object : View

Products Affected

cisco

  • catalyst_sd-wan_manager
  • sd-wan_vmanage
CWE
CWE-863

Incorrect Authorization

CWE-284

Improper Access Control