A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization and modify the configuration of an affected system. The vulnerability is due to insufficient authorization checking on an affected system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to gain privileges beyond what would normally be authorized for their configured user authorization level. This could allow the attacker to modify the configuration of an affected system.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2020-11-06T18:17:05.594181Z
Updated: 2024-11-13T17:42:08.206Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3592
Vulnrichment
Updated: 2024-08-04T07:37:55.693Z
NVD
Status : Modified
Published: 2020-11-06T19:15:15.330
Modified: 2024-11-21T05:31:22.510
Link: CVE-2020-3592
Redhat
No data.