CVE-2020-3485

A vulnerability in the role-based access control (RBAC) functionality of the web management software of Cisco Vision Dynamic Signage Director could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not be able to perform. The vulnerability exists because the web management software does not properly handle RBAC. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to view and delete certain screen content on the system that the attacker would not normally have privileges to access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:vision_dynamic_signage_director:6.2.0:sp2:*:*:*:*:*:*

History

21 Nov 2024, 05:31

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-rbac-y9LM5jw4 - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvdsd-rbac-y9LM5jw4 - Vendor Advisory

Information

Published : 2020-08-26 17:15

Updated : 2024-11-21 05:31


NVD link : CVE-2020-3485

Mitre link : CVE-2020-3485

CVE.ORG link : CVE-2020-3485


JSON object : View

Products Affected

cisco

  • vision_dynamic_signage_director
CWE
CWE-264

Permissions, Privileges, and Access Controls

CWE-276

Incorrect Default Permissions