A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to the affected system. A successful exploit could allow the attacker to view arbitrary files on the affected system.
History

Wed, 13 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-07-16T17:22:23.560326Z

Updated: 2024-11-13T18:19:34.593Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3401

cve-icon Vulnrichment

Updated: 2024-08-04T07:30:58.404Z

cve-icon NVD

Status : Modified

Published: 2020-07-16T18:15:19.300

Modified: 2024-11-21T05:30:57.523

Link: CVE-2020-3401

cve-icon Redhat

No data.