Логотип exploitDog
bind:CVE-2025-20157
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20157

Количество 3

Количество 3

nvd логотип

CVE-2025-20157

9 месяцев назад

A vulnerability in certificate validation processing of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper validation of certificates that are used by the Smart Licensing feature. An attacker with a privileged network position could exploit this vulnerability by intercepting traffic that is sent over the Internet. A successful exploit could allow the attacker to gain access to sensitive information, including credentials used by the device to connect to Cisco cloud services.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-vq58-8wp2-wc83

9 месяцев назад

A vulnerability in certificate validation processing of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper validation of certificates that are used by the Smart Licensing feature. An attacker with a privileged network position could exploit this vulnerability by intercepting traffic that is sent over the Internet. A successful exploit could allow the attacker to gain access to sensitive information, including credentials used by the device to connect to Cisco cloud services.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2025-10319

9 месяцев назад

Уязвимость прикладного программного интерфейса централизованной системы управления сетью Cisco Catalyst SD-WAN Manager, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20157

A vulnerability in certificate validation processing of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper validation of certificates that are used by the Smart Licensing feature. An attacker with a privileged network position could exploit this vulnerability by intercepting traffic that is sent over the Internet. A successful exploit could allow the attacker to gain access to sensitive information, including credentials used by the device to connect to Cisco cloud services.

CVSS3: 5.9
0%
Низкий
9 месяцев назад
github логотип
GHSA-vq58-8wp2-wc83

A vulnerability in certificate validation processing of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper validation of certificates that are used by the Smart Licensing feature. An attacker with a privileged network position could exploit this vulnerability by intercepting traffic that is sent over the Internet. A successful exploit could allow the attacker to gain access to sensitive information, including credentials used by the device to connect to Cisco cloud services.

CVSS3: 5.9
0%
Низкий
9 месяцев назад
fstec логотип
BDU:2025-10319

Уязвимость прикладного программного интерфейса централизованной системы управления сетью Cisco Catalyst SD-WAN Manager, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
0%
Низкий
9 месяцев назад

Уязвимостей на страницу