Lucene search

K
nvd[email protected]NVD:CVE-2023-20179
HistorySep 27, 2023 - 6:15 p.m.

CVE-2023-20179

2023-09-2718:15:10
CWE-79
CWE-80
web.nvd.nist.gov
4
cisco catalyst sd-wan manager
html injection
user-supplied data
browser-based attacks

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

4.8 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.0%

A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content.

This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.

Affected configurations

NVD
Node
ciscosd-wan_vmanageRange<20.6.6
OR
ciscosd-wan_vmanageRange20.720.10

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

4.8 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.0%

Related for NVD:CVE-2023-20179