Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-3115


A vulnerability in the CLI of the Cisco SD-WAN Solution vManage software could allow an authenticated, local attacker to elevate privileges to root-level privileges on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted file to the affected system. An exploit could allow the attacker to elevate privileges to root-level privileges.


Published

2020-01-26T05:15:17.193

Last Modified

2024-11-21T05:30:21.387

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-264
  • Type: Primary
    CWE-269

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco sd-wan_firmware 18.4.1 Yes
Operating System cisco sd-wan_firmware 19.1.0 Yes
Hardware cisco vedge-100 - No
Hardware cisco vedge-1000 - No
Hardware cisco vedge-100b - No
Hardware cisco vedge-2000 - No
Hardware cisco vedge-5000 - No
Hardware cisco vedge_100m - No
Hardware cisco vedge_100wm - No

References