Cisco SD-WAN vManage Software Path Traversal (cisco-sa-vmanpt2-FqLuefsS)

medium Nessus Plugin ID 145551

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco SD-WAN vManage is affected by a path traversal vulnerability due to insufficient validation of HTTP requests. An authenticated, remote attacker can exploit this, by sending a crafted HTTP request that contains directory traversal character sequences, to conduct path traversal attacks and obtain read access to sensitive files on the affected system.

Please see the included Cisco BID and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvv03658

See Also

http://www.nessus.org/u?3d2f53d8

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv03658

Plugin Details

Severity: Medium

ID: 145551

File Name: cisco-sa-vmanpt2-FqLuefsS.nasl

Version: 1.6

Type: local

Family: CISCO

Published: 1/29/2021

Updated: 1/25/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N

CVSS Score Source: CVE-2020-26065

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:sd-wan_firmware, cpe:/a:cisco:sd-wan_vmanage

Required KB Items: Cisco/Viptela/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 11/4/2020

Vulnerability Publication Date: 11/4/2020

Reference Information

CVE: CVE-2020-26065

CWE: 22

CISCO-SA: cisco-sa-vmanpt2-FqLuefsS

IAVA: 2020-A-0509

CISCO-BUG-ID: CSCvv03658