Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-20747

Опубликовано: 15 апр. 2022
Источник: nvd
CVSS3: 6.5
CVSS2: 4
EPSS Низкий

Описание

A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*
Версия до 20.6.1 (исключая)

EPSS

Процентиль: 42%
0.00201
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-202
NVD-CWE-Other

Связанные уязвимости

CVSS3: 6.5
github
почти 4 года назад

A vulnerability in the History API of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected system. This vulnerability is due to insufficient API authorization checking on the underlying operating system. An attacker could exploit this vulnerability by sending a crafted API request to Cisco vManage as a lower-privileged user and gaining access to sensitive information that they would not normally be authorized to access.

CVSS3: 6.5
fstec
почти 4 года назад

Уязвимость компонента History API централизованной системой управления сетью Cisco SD-WAN vManage, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 42%
0.00201
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-202
NVD-CWE-Other