Логотип exploitDog
bind:CVE-2020-3265
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-3265

Количество 3

Количество 3

nvd логотип

CVE-2020-3265

почти 6 лет назад

A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain root-level privileges.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-pp5x-j8jw-xrw4

больше 3 лет назад

A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain root-level privileges.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2020-01208

почти 6 лет назад

Уязвимость программно-определяемой сети Cisco SD-WAN, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-3265

A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain root-level privileges.

CVSS3: 7.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-pp5x-j8jw-xrw4

A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain root-level privileges.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01208

Уязвимость программно-определяемой сети Cisco SD-WAN, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 7
0%
Низкий
почти 6 лет назад

Уязвимостей на страницу