A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to retrieve files that they do not have permission to access.
This vulnerability is due to insufficient file access checks. An attacker could exploit this vulnerability by submitting crafted input in the web-based management interface. A successful exploit could allow the attacker to read files that they are not authorized to access.
Metrics
Affected Vendors & Products
References
History
Wed, 06 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to retrieve files that they do not have permission to access. This vulnerability is due to insufficient file access checks. An attacker could exploit this vulnerability by submitting crafted input in the web-based management interface. A successful exploit could allow the attacker to read files that they are not authorized to access. | |
| Title | Cisco IoT Field Network Director Path Traversal Vulnerability | |
| Weaknesses | CWE-388 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published: 2026-05-06T16:15:48.379Z
Updated: 2026-05-06T17:59:11.531Z
Reserved: 2025-10-08T11:59:15.391Z
Link: CVE-2026-20168
Updated: 2026-05-06T17:59:08.080Z
Status : Awaiting Analysis
Published: 2026-05-06T17:16:20.590
Modified: 2026-05-06T18:59:53.230
Link: CVE-2026-20168
No data.
ReportizFlow