CVE-2020-3379

A vulnerability in Cisco SD-WAN Solution Software could allow an authenticated, local attacker to elevate privileges to Administrator on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain administrative privileges.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmpresc-SyzcS4kC - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmpresc-SyzcS4kC - Vendor Advisory

Information

Published : 2020-07-16 18:15

Updated : 2024-11-21 05:30


NVD link : CVE-2020-3379

Mitre link : CVE-2020-3379

CVE.ORG link : CVE-2020-3379


JSON object : View

Products Affected

cisco

  • vedge_2000
  • vedge_100b
  • vedge_5000
  • vedge_100wm
  • vedge_1000
  • vedge_100
  • vedge_100m
  • vsmart_controller
  • vbond_orchestrator
  • sd-wan_firmware
CWE
CWE-264

Permissions, Privileges, and Access Controls

CWE-20

Improper Input Validation