Логотип exploitDog
bind:CVE-2020-3229
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3229

Количество 3

Количество 3

nvd логотип

CVE-2020-3229

больше 5 лет назад

A vulnerability in Role Based Access Control (RBAC) functionality of Cisco IOS XE Web Management Software could allow a Read-Only authenticated, remote attacker to execute commands or configuration changes as an Admin user. The vulnerability is due to incorrect handling of RBAC for the administration GUI. An attacker could exploit this vulnerability by sending a modified HTTP request to the affected device. An exploit could allow the attacker as a Read-Only user to execute CLI commands or configuration changes as if they were an Admin user.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gffh-92vm-w5gf

больше 3 лет назад

A vulnerability in Role Based Access Control (RBAC) functionality of Cisco IOS XE Web Management Software could allow a Read-Only authenticated, remote attacker to execute commands or configuration changes as an Admin user. The vulnerability is due to incorrect handling of RBAC for the administration GUI. An attacker could exploit this vulnerability by sending a modified HTTP request to the affected device. An exploit could allow the attacker as a Read-Only user to execute CLI commands or configuration changes as if they were an Admin user.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2020-02751

больше 5 лет назад

Уязвимость реализации функции контроля доступа на основе ролей Role Based Access Control (RBAC) операционной системы Cisco IOS XE, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3229

A vulnerability in Role Based Access Control (RBAC) functionality of Cisco IOS XE Web Management Software could allow a Read-Only authenticated, remote attacker to execute commands or configuration changes as an Admin user. The vulnerability is due to incorrect handling of RBAC for the administration GUI. An attacker could exploit this vulnerability by sending a modified HTTP request to the affected device. An exploit could allow the attacker as a Read-Only user to execute CLI commands or configuration changes as if they were an Admin user.

CVSS3: 8.8
1%
Низкий
больше 5 лет назад
github логотип
GHSA-gffh-92vm-w5gf

A vulnerability in Role Based Access Control (RBAC) functionality of Cisco IOS XE Web Management Software could allow a Read-Only authenticated, remote attacker to execute commands or configuration changes as an Admin user. The vulnerability is due to incorrect handling of RBAC for the administration GUI. An attacker could exploit this vulnerability by sending a modified HTTP request to the affected device. An exploit could allow the attacker as a Read-Only user to execute CLI commands or configuration changes as if they were an Admin user.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02751

Уязвимость реализации функции контроля доступа на основе ролей Role Based Access Control (RBAC) операционной системы Cisco IOS XE, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 8.8
1%
Низкий
больше 5 лет назад

Уязвимостей на страницу