cvelist/2020/3xxx/CVE-2020-3387.json

91 lines
3.2 KiB
JSON
Raw Normal View History

2019-12-12 18:02:01 +00:00
{
"CVE_data_meta": {
2020-07-15 16:29:24 +00:00
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-07-15T16:00:00",
2019-12-12 18:02:01 +00:00
"ID": "CVE-2020-3387",
2020-07-15 16:29:24 +00:00
"STATE": "PUBLIC",
"TITLE": "Cisco SD-WAN vManage Software Remote Code Execution Vulnerability"
2019-12-12 18:02:01 +00:00
},
2020-07-15 16:29:24 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco SD-WAN vManage ",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2019-12-12 18:02:01 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-07-16 18:01:34 +00:00
"value": "A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to execute code with root privileges on an affected system. The vulnerability is due to insufficient input sanitization during user authentication processing. An attacker could exploit this vulnerability by sending a crafted response to the Cisco SD-WAN vManage Software. A successful exploit could allow the attacker to access the software and execute commands they should not be authorized to execute."
2019-12-12 18:02:01 +00:00
}
]
2020-07-15 16:29:24 +00:00
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "7.5",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200715 Cisco SD-WAN vManage Software Remote Code Execution Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanrce-4jtWT28P"
2021-06-03 18:00:54 +00:00
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html",
"url": "http://packetstormsecurity.com/files/162958/Cisco-SD-WAN-vManage-19.2.2-Remote-Root.html"
2020-07-15 16:29:24 +00:00
}
]
},
"source": {
"advisory": "cisco-sa-vmanrce-4jtWT28P",
"defect": [
[
"CSCvt70892"
]
],
"discovery": "INTERNAL"
2019-12-12 18:02:01 +00:00
}
2020-07-16 18:01:34 +00:00
}