Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-20252


A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manager Software could allow an unauthenticated, remote attacker to gain unauthorized access to the application as an arbitrary user. This vulnerability is due to improper authentication checks for SAML APIs. An attacker could exploit this vulnerability by sending requests directly to the SAML API. A successful exploit could allow the attacker to generate an authorization token sufficient to gain access to the application.


Published

2023-09-27T18:15:11.553

Last Modified

2024-11-21T07:40:59.973

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-862
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco catalyst_sd-wan_manager 20.9.3.2 Yes
Application cisco catalyst_sd-wan_manager 20.11.1.2 Yes

References