New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 5.9
SynopsisThe remote device is missing a vendor-supplied security patch
DescriptionAccording to its self-reported version number, the instance of Cisco Viptela hosted on the remote server is prior to 19.2.2. It is, therefore, affected by multiple vulnerabilities:
- A privilege escalation vulnerability exists in Cisco SD-WAN Solutions due to insufficient input validation.
An authenticated, local attacker can exploit this, by sending a crafted request to an affected system, to gain root access to the system. (CVE-2020-3265)
- A buffer overflow condition exists in Cisco SD-WAN Solutions due to insufficient input validation. An authenticated, local attacker can exploit this, by sending crafted traffic to an affected device, to gain access to information that they are not authorized to access and make changes to the system that they are not authorized to make. (CVE-2020-3264)
SolutionUpgrade to the relevant fixed version referenced in Cisco bug ID CSCvs50619 or CSCvs47117