Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CNVD-2023-80110
Vulnerability from cnvd - Published: 2023-10-17
VLAI Severity ?
Title
Cisco Catalyst SD-WAN Manager本地文件包含漏洞
Description
Cisco Catalyst SD-WAN Manager是一款开放、安全的云级架构管理控制台。
Cisco Catalyst SD-WAN Manager web UI存在本地文件包含漏洞,远程攻击者可利用该漏洞提交特殊的请求,可以应用程序上下文读取系统文件内容。
Severity
中
Patch Name
Cisco Catalyst SD-WAN Manager本地文件包含漏洞的补丁
Patch Description
Cisco Catalyst SD-WAN Manager是一款开放、安全的云级架构管理控制台。
Cisco Catalyst SD-WAN Manager web UI存在本地文件包含漏洞,远程攻击者可利用该漏洞提交特殊的请求,可以应用程序上下文读取系统文件内容。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe
Reference
https://nvd.nist.gov/vuln/detail/CVE-2023-20261
Impacted products
| Name | Cisco Catalyst SD-WAN Manager |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2023-20261",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2023-20261"
}
},
"description": "Cisco Catalyst SD-WAN Manager\u662f\u4e00\u6b3e\u5f00\u653e\u3001\u5b89\u5168\u7684\u4e91\u7ea7\u67b6\u6784\u7ba1\u7406\u63a7\u5236\u53f0\u3002\n\nCisco Catalyst SD-WAN Manager web UI\u5b58\u5728\u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u7684\u8bf7\u6c42\uff0c\u53ef\u4ee5\u5e94\u7528\u7a0b\u5e8f\u4e0a\u4e0b\u6587\u8bfb\u53d6\u7cfb\u7edf\u6587\u4ef6\u5185\u5bb9\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2023-80110",
"openTime": "2023-10-17",
"patchDescription": "Cisco Catalyst SD-WAN Manager\u662f\u4e00\u6b3e\u5f00\u653e\u3001\u5b89\u5168\u7684\u4e91\u7ea7\u67b6\u6784\u7ba1\u7406\u63a7\u5236\u53f0\u3002\r\n\r\nCisco Catalyst SD-WAN Manager web UI\u5b58\u5728\u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u7684\u8bf7\u6c42\uff0c\u53ef\u4ee5\u5e94\u7528\u7a0b\u5e8f\u4e0a\u4e0b\u6587\u8bfb\u53d6\u7cfb\u7edf\u6587\u4ef6\u5185\u5bb9\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco Catalyst SD-WAN Manager\u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Cisco Catalyst SD-WAN Manager"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2023-20261",
"serverity": "\u4e2d",
"submitTime": "2023-10-23",
"title": "Cisco Catalyst SD-WAN Manager\u672c\u5730\u6587\u4ef6\u5305\u542b\u6f0f\u6d1e"
}
CVE-2023-20261 (GCVE-0-2023-20261)
Vulnerability from cvelistv5 – Published: 2023-10-18 16:27 – Updated: 2025-06-12 15:04
VLAI?
EPSS
Summary
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.
This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user.
Severity ?
6.5 (Medium)
CWE
- CWE-284 - Improper Access Control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco SD-WAN vManage |
Affected:
17.2.6
Affected: 17.2.7 Affected: 17.2.8 Affected: 17.2.9 Affected: 17.2.10 Affected: 17.2.4 Affected: 17.2.5 Affected: 18.3.1.1 Affected: 18.3.3.1 Affected: 18.3.3 Affected: 18.3.4 Affected: 18.3.5 Affected: 18.3.7 Affected: 18.3.8 Affected: 18.3.6.1 Affected: 18.3.1 Affected: 18.3.0 Affected: 18.4.0.1 Affected: 18.4.3 Affected: 18.4.302 Affected: 18.4.303 Affected: 18.4.4 Affected: 18.4.5 Affected: 18.4.0 Affected: 18.4.1 Affected: 18.4.6 Affected: 19.2.0 Affected: 19.2.097 Affected: 19.2.099 Affected: 19.2.1 Affected: 19.2.2 Affected: 19.2.3 Affected: 19.2.31 Affected: 19.2.929 Affected: 19.2.4 Affected: 20.1.1.1 Affected: 20.1.12 Affected: 20.1.1 Affected: 20.1.2 Affected: 20.1.3 Affected: 19.3.0 Affected: 19.1.0 Affected: 18.2.0 Affected: 20.3.1 Affected: 20.3.2 Affected: 20.3.2.1 Affected: 20.3.3 Affected: 20.3.3.1 Affected: 20.3.4 Affected: 20.3.4.1 Affected: 20.3.4.2 Affected: 20.3.5 Affected: 20.3.6 Affected: 20.3.7 Affected: 20.3.7.1 Affected: 20.3.4.3 Affected: 20.3.5.1 Affected: 20.3.7.2 Affected: 20.3.8 Affected: 20.4.1 Affected: 20.4.1.1 Affected: 20.4.1.2 Affected: 20.4.2 Affected: 20.4.2.2 Affected: 20.4.2.1 Affected: 20.4.2.3 Affected: 20.5.1 Affected: 20.5.1.2 Affected: 20.5.1.1 Affected: 20.6.1 Affected: 20.6.1.1 Affected: 20.6.2.1 Affected: 20.6.2.2 Affected: 20.6.2 Affected: 20.6.3 Affected: 20.6.3.1 Affected: 20.6.4 Affected: 20.6.5 Affected: 20.6.5.1 Affected: 20.6.1.2 Affected: 20.6.3.2 Affected: 20.6.4.1 Affected: 20.6.5.2 Affected: 20.6.5.4 Affected: 20.6.3.3 Affected: 20.6.4.2 Affected: 20.6.3.0.45 Affected: 20.6.3.0.46 Affected: 20.6.3.0.47 Affected: 20.6.3.4 Affected: 20.6.4.0.21 Affected: 20.6.5.1.10 Affected: 20.6.5.1.11 Affected: 20.6.5.1.7 Affected: 20.6.5.1.9 Affected: 20.6.5.2.4 Affected: 20.6.5.5 Affected: 20.6.5.2.8 Affected: 20.6.5.1.13 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:05:36.960Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-sdwan-lfi-OWLbKUGe",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20261",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-12T15:04:21.425909Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-12T15:04:33.809Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco SD-WAN vManage",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "17.2.6"
},
{
"status": "affected",
"version": "17.2.7"
},
{
"status": "affected",
"version": "17.2.8"
},
{
"status": "affected",
"version": "17.2.9"
},
{
"status": "affected",
"version": "17.2.10"
},
{
"status": "affected",
"version": "17.2.4"
},
{
"status": "affected",
"version": "17.2.5"
},
{
"status": "affected",
"version": "18.3.1.1"
},
{
"status": "affected",
"version": "18.3.3.1"
},
{
"status": "affected",
"version": "18.3.3"
},
{
"status": "affected",
"version": "18.3.4"
},
{
"status": "affected",
"version": "18.3.5"
},
{
"status": "affected",
"version": "18.3.7"
},
{
"status": "affected",
"version": "18.3.8"
},
{
"status": "affected",
"version": "18.3.6.1"
},
{
"status": "affected",
"version": "18.3.1"
},
{
"status": "affected",
"version": "18.3.0"
},
{
"status": "affected",
"version": "18.4.0.1"
},
{
"status": "affected",
"version": "18.4.3"
},
{
"status": "affected",
"version": "18.4.302"
},
{
"status": "affected",
"version": "18.4.303"
},
{
"status": "affected",
"version": "18.4.4"
},
{
"status": "affected",
"version": "18.4.5"
},
{
"status": "affected",
"version": "18.4.0"
},
{
"status": "affected",
"version": "18.4.1"
},
{
"status": "affected",
"version": "18.4.6"
},
{
"status": "affected",
"version": "19.2.0"
},
{
"status": "affected",
"version": "19.2.097"
},
{
"status": "affected",
"version": "19.2.099"
},
{
"status": "affected",
"version": "19.2.1"
},
{
"status": "affected",
"version": "19.2.2"
},
{
"status": "affected",
"version": "19.2.3"
},
{
"status": "affected",
"version": "19.2.31"
},
{
"status": "affected",
"version": "19.2.929"
},
{
"status": "affected",
"version": "19.2.4"
},
{
"status": "affected",
"version": "20.1.1.1"
},
{
"status": "affected",
"version": "20.1.12"
},
{
"status": "affected",
"version": "20.1.1"
},
{
"status": "affected",
"version": "20.1.2"
},
{
"status": "affected",
"version": "20.1.3"
},
{
"status": "affected",
"version": "19.3.0"
},
{
"status": "affected",
"version": "19.1.0"
},
{
"status": "affected",
"version": "18.2.0"
},
{
"status": "affected",
"version": "20.3.1"
},
{
"status": "affected",
"version": "20.3.2"
},
{
"status": "affected",
"version": "20.3.2.1"
},
{
"status": "affected",
"version": "20.3.3"
},
{
"status": "affected",
"version": "20.3.3.1"
},
{
"status": "affected",
"version": "20.3.4"
},
{
"status": "affected",
"version": "20.3.4.1"
},
{
"status": "affected",
"version": "20.3.4.2"
},
{
"status": "affected",
"version": "20.3.5"
},
{
"status": "affected",
"version": "20.3.6"
},
{
"status": "affected",
"version": "20.3.7"
},
{
"status": "affected",
"version": "20.3.7.1"
},
{
"status": "affected",
"version": "20.3.4.3"
},
{
"status": "affected",
"version": "20.3.5.1"
},
{
"status": "affected",
"version": "20.3.7.2"
},
{
"status": "affected",
"version": "20.3.8"
},
{
"status": "affected",
"version": "20.4.1"
},
{
"status": "affected",
"version": "20.4.1.1"
},
{
"status": "affected",
"version": "20.4.1.2"
},
{
"status": "affected",
"version": "20.4.2"
},
{
"status": "affected",
"version": "20.4.2.2"
},
{
"status": "affected",
"version": "20.4.2.1"
},
{
"status": "affected",
"version": "20.4.2.3"
},
{
"status": "affected",
"version": "20.5.1"
},
{
"status": "affected",
"version": "20.5.1.2"
},
{
"status": "affected",
"version": "20.5.1.1"
},
{
"status": "affected",
"version": "20.6.1"
},
{
"status": "affected",
"version": "20.6.1.1"
},
{
"status": "affected",
"version": "20.6.2.1"
},
{
"status": "affected",
"version": "20.6.2.2"
},
{
"status": "affected",
"version": "20.6.2"
},
{
"status": "affected",
"version": "20.6.3"
},
{
"status": "affected",
"version": "20.6.3.1"
},
{
"status": "affected",
"version": "20.6.4"
},
{
"status": "affected",
"version": "20.6.5"
},
{
"status": "affected",
"version": "20.6.5.1"
},
{
"status": "affected",
"version": "20.6.1.2"
},
{
"status": "affected",
"version": "20.6.3.2"
},
{
"status": "affected",
"version": "20.6.4.1"
},
{
"status": "affected",
"version": "20.6.5.2"
},
{
"status": "affected",
"version": "20.6.5.4"
},
{
"status": "affected",
"version": "20.6.3.3"
},
{
"status": "affected",
"version": "20.6.4.2"
},
{
"status": "affected",
"version": "20.6.3.0.45"
},
{
"status": "affected",
"version": "20.6.3.0.46"
},
{
"status": "affected",
"version": "20.6.3.0.47"
},
{
"status": "affected",
"version": "20.6.3.4"
},
{
"status": "affected",
"version": "20.6.4.0.21"
},
{
"status": "affected",
"version": "20.6.5.1.10"
},
{
"status": "affected",
"version": "20.6.5.1.11"
},
{
"status": "affected",
"version": "20.6.5.1.7"
},
{
"status": "affected",
"version": "20.6.5.1.9"
},
{
"status": "affected",
"version": "20.6.5.2.4"
},
{
"status": "affected",
"version": "20.6.5.5"
},
{
"status": "affected",
"version": "20.6.5.2.8"
},
{
"status": "affected",
"version": "20.6.5.1.13"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.\r\n\r This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "Improper Access Control",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-25T16:58:34.365Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-sdwan-lfi-OWLbKUGe",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe"
}
],
"source": {
"advisory": "cisco-sa-sdwan-lfi-OWLbKUGe",
"defects": [
"CSCwf75979"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20261",
"datePublished": "2023-10-18T16:27:01.866Z",
"dateReserved": "2022-10-27T18:47:50.373Z",
"dateUpdated": "2025-06-12T15:04:33.809Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…