Lucene search

K
cveCiscoCVE-2020-3223
HistoryJun 03, 2020 - 6:15 p.m.

CVE-2020-3223

2020-06-0318:15:20
CWE-59
cisco
web.nvd.nist.gov
33
cisco
ios xe software
web ui
vulnerability
remote attackers
arbitrary files
nvd
cve-2020-3223

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:C/I:N/A:N

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

5.1

Confidence

High

EPSS

0.002

Percentile

51.6%

A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker with administrative privileges to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web UI. An exploit could allow the attacker to read arbitrary files from the underlying operating system’s filesystem.

Affected configurations

Nvd
Node
ciscoios_xeMatch16.9.4
OR
ciscoios_xeMatch16.9.4c
OR
ciscoios_xeMatch16.11.1
OR
ciscoios_xeMatch16.11.1a
OR
ciscoios_xeMatch16.11.1b
OR
ciscoios_xeMatch16.11.1c
OR
ciscoios_xeMatch16.11.1s
OR
ciscoios_xeMatch16.11.2
OR
ciscoios_xeMatch16.12.1
OR
ciscoios_xeMatch16.12.1a
OR
ciscoios_xeMatch16.12.1c
OR
ciscoios_xeMatch16.12.1s
OR
ciscoios_xeMatch16.12.1t
OR
ciscoios_xeMatch16.12.1w
OR
ciscoios_xeMatch16.12.1y
VendorProductVersionCPE
ciscoios_xe16.9.4cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*
ciscoios_xe16.9.4ccpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*
ciscoios_xe16.11.1cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*
ciscoios_xe16.11.1acpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*
ciscoios_xe16.11.1bcpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*
ciscoios_xe16.11.1ccpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*
ciscoios_xe16.11.1scpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*
ciscoios_xe16.11.2cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*
ciscoios_xe16.12.1cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*
ciscoios_xe16.12.1acpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*
Rows per page:
1-10 of 151

CNA Affected

[
  {
    "product": "Cisco IOS XE Software 16.9.4",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:C/I:N/A:N

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

5.1

Confidence

High

EPSS

0.002

Percentile

51.6%

Related for CVE-2020-3223