cve-2023-20261
Vulnerability from cvelistv5
Published
2023-10-18 16:27
Modified
2024-08-02 09:05
Summary
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system. This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user.
Impacted products
Vendor Product Version
Cisco Cisco SD-WAN vManage Version: 17.2.6
Version: 17.2.7
Version: 17.2.8
Version: 17.2.9
Version: 17.2.10
Version: 17.2.4
Version: 17.2.5
Version: 18.3.1.1
Version: 18.3.3.1
Version: 18.3.3
Version: 18.3.4
Version: 18.3.5
Version: 18.3.7
Version: 18.3.8
Version: 18.3.6.1
Version: 18.3.1
Version: 18.3.0
Version: 18.4.0.1
Version: 18.4.3
Version: 18.4.302
Version: 18.4.303
Version: 18.4.4
Version: 18.4.5
Version: 18.4.0
Version: 18.4.1
Version: 18.4.6
Version: 19.2.0
Version: 19.2.097
Version: 19.2.099
Version: 19.2.1
Version: 19.2.2
Version: 19.2.3
Version: 19.2.31
Version: 19.2.929
Version: 19.2.4
Version: 20.1.1.1
Version: 20.1.12
Version: 20.1.1
Version: 20.1.2
Version: 20.1.3
Version: 19.3.0
Version: 19.1.0
Version: 18.2.0
Version: 20.3.1
Version: 20.3.2
Version: 20.3.2.1
Version: 20.3.3
Version: 20.3.3.1
Version: 20.3.4
Version: 20.3.4.1
Version: 20.3.4.2
Version: 20.3.5
Version: 20.3.6
Version: 20.3.7
Version: 20.3.7.1
Version: 20.3.4.3
Version: 20.3.5.1
Version: 20.3.7.2
Version: 20.3.8
Version: 20.4.1
Version: 20.4.1.1
Version: 20.4.1.2
Version: 20.4.2
Version: 20.4.2.2
Version: 20.4.2.1
Version: 20.4.2.3
Version: 20.5.1
Version: 20.5.1.2
Version: 20.5.1.1
Version: 20.6.1
Version: 20.6.1.1
Version: 20.6.2.1
Version: 20.6.2.2
Version: 20.6.2
Version: 20.6.3
Version: 20.6.3.1
Version: 20.6.4
Version: 20.6.5
Version: 20.6.5.1
Version: 20.6.1.2
Version: 20.6.3.2
Version: 20.6.4.1
Version: 20.6.5.2
Version: 20.6.5.4
Version: 20.6.3.3
Version: 20.6.4.2
Version: 20.6.3.0.45
Version: 20.6.3.0.46
Version: 20.6.3.0.47
Version: 20.6.3.4
Version: 20.6.4.0.21
Version: 20.6.5.1.10
Version: 20.6.5.1.11
Version: 20.6.5.1.7
Version: 20.6.5.1.9
Version: 20.6.5.2.4
Version: 20.6.5.5
Version: 20.6.5.2.8
Version: 20.6.5.1.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.960Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-sdwan-lfi-OWLbKUGe",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco SD-WAN vManage",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "17.2.6"
            },
            {
              "status": "affected",
              "version": "17.2.7"
            },
            {
              "status": "affected",
              "version": "17.2.8"
            },
            {
              "status": "affected",
              "version": "17.2.9"
            },
            {
              "status": "affected",
              "version": "17.2.10"
            },
            {
              "status": "affected",
              "version": "17.2.4"
            },
            {
              "status": "affected",
              "version": "17.2.5"
            },
            {
              "status": "affected",
              "version": "18.3.1.1"
            },
            {
              "status": "affected",
              "version": "18.3.3.1"
            },
            {
              "status": "affected",
              "version": "18.3.3"
            },
            {
              "status": "affected",
              "version": "18.3.4"
            },
            {
              "status": "affected",
              "version": "18.3.5"
            },
            {
              "status": "affected",
              "version": "18.3.7"
            },
            {
              "status": "affected",
              "version": "18.3.8"
            },
            {
              "status": "affected",
              "version": "18.3.6.1"
            },
            {
              "status": "affected",
              "version": "18.3.1"
            },
            {
              "status": "affected",
              "version": "18.3.0"
            },
            {
              "status": "affected",
              "version": "18.4.0.1"
            },
            {
              "status": "affected",
              "version": "18.4.3"
            },
            {
              "status": "affected",
              "version": "18.4.302"
            },
            {
              "status": "affected",
              "version": "18.4.303"
            },
            {
              "status": "affected",
              "version": "18.4.4"
            },
            {
              "status": "affected",
              "version": "18.4.5"
            },
            {
              "status": "affected",
              "version": "18.4.0"
            },
            {
              "status": "affected",
              "version": "18.4.1"
            },
            {
              "status": "affected",
              "version": "18.4.6"
            },
            {
              "status": "affected",
              "version": "19.2.0"
            },
            {
              "status": "affected",
              "version": "19.2.097"
            },
            {
              "status": "affected",
              "version": "19.2.099"
            },
            {
              "status": "affected",
              "version": "19.2.1"
            },
            {
              "status": "affected",
              "version": "19.2.2"
            },
            {
              "status": "affected",
              "version": "19.2.3"
            },
            {
              "status": "affected",
              "version": "19.2.31"
            },
            {
              "status": "affected",
              "version": "19.2.929"
            },
            {
              "status": "affected",
              "version": "19.2.4"
            },
            {
              "status": "affected",
              "version": "20.1.1.1"
            },
            {
              "status": "affected",
              "version": "20.1.12"
            },
            {
              "status": "affected",
              "version": "20.1.1"
            },
            {
              "status": "affected",
              "version": "20.1.2"
            },
            {
              "status": "affected",
              "version": "20.1.3"
            },
            {
              "status": "affected",
              "version": "19.3.0"
            },
            {
              "status": "affected",
              "version": "19.1.0"
            },
            {
              "status": "affected",
              "version": "18.2.0"
            },
            {
              "status": "affected",
              "version": "20.3.1"
            },
            {
              "status": "affected",
              "version": "20.3.2"
            },
            {
              "status": "affected",
              "version": "20.3.2.1"
            },
            {
              "status": "affected",
              "version": "20.3.3"
            },
            {
              "status": "affected",
              "version": "20.3.3.1"
            },
            {
              "status": "affected",
              "version": "20.3.4"
            },
            {
              "status": "affected",
              "version": "20.3.4.1"
            },
            {
              "status": "affected",
              "version": "20.3.4.2"
            },
            {
              "status": "affected",
              "version": "20.3.5"
            },
            {
              "status": "affected",
              "version": "20.3.6"
            },
            {
              "status": "affected",
              "version": "20.3.7"
            },
            {
              "status": "affected",
              "version": "20.3.7.1"
            },
            {
              "status": "affected",
              "version": "20.3.4.3"
            },
            {
              "status": "affected",
              "version": "20.3.5.1"
            },
            {
              "status": "affected",
              "version": "20.3.7.2"
            },
            {
              "status": "affected",
              "version": "20.3.8"
            },
            {
              "status": "affected",
              "version": "20.4.1"
            },
            {
              "status": "affected",
              "version": "20.4.1.1"
            },
            {
              "status": "affected",
              "version": "20.4.1.2"
            },
            {
              "status": "affected",
              "version": "20.4.2"
            },
            {
              "status": "affected",
              "version": "20.4.2.2"
            },
            {
              "status": "affected",
              "version": "20.4.2.1"
            },
            {
              "status": "affected",
              "version": "20.4.2.3"
            },
            {
              "status": "affected",
              "version": "20.5.1"
            },
            {
              "status": "affected",
              "version": "20.5.1.2"
            },
            {
              "status": "affected",
              "version": "20.5.1.1"
            },
            {
              "status": "affected",
              "version": "20.6.1"
            },
            {
              "status": "affected",
              "version": "20.6.1.1"
            },
            {
              "status": "affected",
              "version": "20.6.2.1"
            },
            {
              "status": "affected",
              "version": "20.6.2.2"
            },
            {
              "status": "affected",
              "version": "20.6.2"
            },
            {
              "status": "affected",
              "version": "20.6.3"
            },
            {
              "status": "affected",
              "version": "20.6.3.1"
            },
            {
              "status": "affected",
              "version": "20.6.4"
            },
            {
              "status": "affected",
              "version": "20.6.5"
            },
            {
              "status": "affected",
              "version": "20.6.5.1"
            },
            {
              "status": "affected",
              "version": "20.6.1.2"
            },
            {
              "status": "affected",
              "version": "20.6.3.2"
            },
            {
              "status": "affected",
              "version": "20.6.4.1"
            },
            {
              "status": "affected",
              "version": "20.6.5.2"
            },
            {
              "status": "affected",
              "version": "20.6.5.4"
            },
            {
              "status": "affected",
              "version": "20.6.3.3"
            },
            {
              "status": "affected",
              "version": "20.6.4.2"
            },
            {
              "status": "affected",
              "version": "20.6.3.0.45"
            },
            {
              "status": "affected",
              "version": "20.6.3.0.46"
            },
            {
              "status": "affected",
              "version": "20.6.3.0.47"
            },
            {
              "status": "affected",
              "version": "20.6.3.4"
            },
            {
              "status": "affected",
              "version": "20.6.4.0.21"
            },
            {
              "status": "affected",
              "version": "20.6.5.1.10"
            },
            {
              "status": "affected",
              "version": "20.6.5.1.11"
            },
            {
              "status": "affected",
              "version": "20.6.5.1.7"
            },
            {
              "status": "affected",
              "version": "20.6.5.1.9"
            },
            {
              "status": "affected",
              "version": "20.6.5.2.4"
            },
            {
              "status": "affected",
              "version": "20.6.5.5"
            },
            {
              "status": "affected",
              "version": "20.6.5.2.8"
            },
            {
              "status": "affected",
              "version": "20.6.5.1.13"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.\r\n\r This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Control",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-25T16:58:34.365Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-sdwan-lfi-OWLbKUGe",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe"
        }
      ],
      "source": {
        "advisory": "cisco-sa-sdwan-lfi-OWLbKUGe",
        "defects": [
          "CSCwf75979"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20261",
    "datePublished": "2023-10-18T16:27:01.866Z",
    "dateReserved": "2022-10-27T18:47:50.373Z",
    "dateUpdated": "2024-08-02T09:05:36.960Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-20261\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2023-10-18T17:15:08.467\",\"lastModified\":\"2024-11-21T07:41:01.273\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.\\r\\n\\r This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la interfaz de usuario web de Cisco Catalyst SD-WAN Manager podr\u00eda permitir que un atacante remoto autenticado recupere archivos arbitrarios de un sistema afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de los par\u00e1metros que se env\u00edan a la interfaz de usuario web. Un atacante podr\u00eda aprovechar esta vulnerabilidad iniciando sesi\u00f3n en Cisco Catalyst SD-WAN Manager y emitiendo solicitudes manipuladas mediante la interfaz de usuario web. Un exploit exitoso podr\u00eda permitir al atacante obtener archivos arbitrarios del sistema de archivos Linux subyacente de un sistema afectado. Para aprovechar esta vulnerabilidad, el atacante debe ser un usuario autenticado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0D5F32C-BFC1-49CC-BE96-920FCBE567B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F621202C-3851-4D7E-BFA2-DABB08E73DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38132BE5-528B-472E-9249-B226C0DE1C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C817B2-DDB9-4CAF-96C9-776482A8597D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC5D29FD-0917-4C1F-AE75-2D63F5C9C58D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3090C4-15E6-4746-B0D2-27665AB91B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04E924CC-3161-436D-93F0-066F76172F55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED059CD-AD0A-4748-8390-8CDCF4C4D1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6990E97D-30E9-42A9-AE6A-CC597DF75B0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B60BA4-EA02-4D0D-82C3-1B08016EF5AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9DC51F7-72D4-4593-8DDE-8AA3955BB826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B047A011-1C27-4D86-99C1-BFCDC7F04A9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADEA8FB-3298-4534-B65E-81060E3DB45A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4C6DF1F-4995-4486-8F90-9EFD6417ABA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D249954-93E0-4124-B9BA-84B9F34D7CB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7F20EBE-DFDF-4996-93D1-28EE776BC777\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DF09CAB-CA1B-428E-9A0B-AADACE9201A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99ED480-C206-48DD-9DF3-FC60D91B98A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC515B6-27A3-4723-9792-2BA42EF63E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEC0BBDA-FAE5-4AF7-81C8-83041A58E8E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A066E28-31B0-46C7-ABB8-F5D1F3A303C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8F536CC-29D6-401E-92C5-964FDBDCCE65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9139593A-9414-488D-AA3A-5560C643587D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07BFB47E-F456-4782-98D7-68D02500FDD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57F0D358-54BE-4A47-8B76-D23B5CCC4BE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33BEBE47-AF47-4994-871D-5969270EE5AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A27094E7-E6F3-47CA-A90A-86FEA2F1BE33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D6D47A0-43A2-4F9F-830B-B2FB79E779A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E7B932-950A-4573-832F-8477FABA5929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1711A70-5931-4C1F-B522-46AD2E5D7C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE41B8AE-8F1E-4116-BDDC-65B913AD448E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EC80219-C760-4CA8-B360-7B6545F502C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA93E21E-4D61-4CA5-ACF2-50C2A4F2C62C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E425CF-5773-4C17-B284-588DDCE8DE43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34886EDF-1C10-4F57-A82D-FF1AF668E2C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D7B3B10-6936-4352-9EE7-561BB1918769\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EB69F8B-67CB-4296-893A-7A35B155EBEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"491BD04C-85BE-4766-9965-59744D2639CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"545F75A3-451C-4993-98AE-51C23EF49927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BB0DD6B-6C4D-4FF4-97AB-815A4566320F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D144CB1-0AD1-4C8A-A709-52C26965675F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1038B545-CD2F-4338-AFE0-35D7ED6D20BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"482DC851-7E33-4487-8219-6675091FD7C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAFBFE36-6913-4122-A537-F2AA1562FE69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16DB9C4B-F828-482B-90BB-6633B2CD3393\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19F4011C-DB20-4866-8BE6-F539677E4C48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A693E125-8027-4482-AF78-5A4342D61274\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8292733-EC96-4B99-8E56-7236D5320109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCE6E7CD-856D-410E-A061-8CD9F0EA4791\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"039687D4-7A7C-464D-8011-FD66E651C297\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6475000-D552-4118-8C91-F999D4A67A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FDBE88C-F71A-49FF-A6E6-9318BAEC4D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1598FA0A-1EAB-4588-9DD0-9F8F0C821189\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E44EDDB-3809-4192-BC7C-1D6B23B9F580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97411227-9FCA-41AB-AB10-44525AC2D7E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95B4A27A-B281-4850-9790-ADB31FC37C69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB09AD3E-07B1-4DE7-BA75-882D3CA47ACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0784F3-A3C2-486F-AE4A-8A5733D5B0E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D2A6AD-E35E-4284-91E8-AA4FAFA790D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D7BAEC-18A0-4BA3-BA5A-3149A2656806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB8B95FD-A5B2-4EF9-AE89-05A6417DDD33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"231EA8DA-4BD6-4ECD-B4BE-6C8AA286E3F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"434DD059-F5DF-487F-A3FF-A417ABF950EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A148EC-9137-4FE4-B363-9FEEE954D606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EE297A8-4E64-48ED-AA3A-4BA798C4DA11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC362BA-6A95-485C-8B49-AA12898E6FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF5A260-FB47-4C5C-AF74-7AB8B71F429E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E5922B-DDD5-4A8A-A725-BBFB09D19AE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94FE6BDD-1E18-455D-8237-06969516D04F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4683477E-D6BB-4369-AFC2-782FD8F3F28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AA663C-B4CB-4804-A0A3-34673266D9D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"672F8B07-AC0A-429D-A9CF-5A95EB495A24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE2B3AF-B15C-460E-B5E7-787AD499E1DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A584DA-1488-466D-AF16-95C254179ABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D93607A-99AE-4DC1-9314-5425C2A335FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5F1CA43-C924-4419-91DB-F24D450CF630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DC5F95-2B2C-4539-ADB2-AA73031A4128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE54844-715B-4492-B9A0-DA1D0A5981CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4366495B-9D70-416A-A033-1379C24A690A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"310EAB40-8AEE-4E1E-BF0B-05F6F04E0B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"329E2793-6824-48E9-8878-5D17E4B97358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4628A095-15DD-4307-ADAE-08C10D9008C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41084A4F-B8DA-4D33-820D-0992CD03C1ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D93C58-0ABF-4D57-99CB-95AB4805CD9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40D45591-93DC-4EF0-9E0A-2F7F270E2403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AD78F8C-B1D3-49ED-8017-2E906C332D82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EBF7D1-0C77-4F95-84FD-56EFD7524463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4790622C-6D8A-4D2B-9E9E-6AC60AA4FB1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"685C7CB4-9536-4112-B08D-25B7C026521F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E84754C7-6517-4E68-A1FB-A49E9B1AB001\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E6E2A7-B36F-4722-A1F9-42D377548F96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47CEC7FB-2AFD-4520-B0D2-BC453CFED93F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4878A80-9403-44EA-95E8-B5A550867DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6C1648-7F63-47C3-A3C0-989E575DD20C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B99428-019F-4AE8-AEE6-91E52AE62AD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DC1BC44-F0A7-4C51-88FE-014BBFEDCFD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A5780D-610E-4EED-A80D-4D17C2360CA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6F38AB7-00C9-4AFF-B254-9EE5CE29C21B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7768FC87-5FEC-445B-9BA7-7EB80AF6346D\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.