ID

VAR-202006-1109


CVE

CVE-2020-3245


TITLE

Cisco Smart Software Manager On-Prem Vulnerability regarding lack of authentication in

Trust: 0.8

sources: JVNDB: JVNDB-2020-006874

DESCRIPTION

A vulnerability in the web application of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to create arbitrary user accounts. The vulnerability is due to the lack of authorization controls in the web application. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to add user accounts to the configuration of an affected device. These accounts would not be administrator or operator accounts

Trust: 1.71

sources: NVD: CVE-2020-3245 // JVNDB: JVNDB-2020-006874 // VULHUB: VHN-181370

AFFECTED PRODUCTS

vendor:ciscomodel:smart software manager on-premscope:ltversion:8-202004

Trust: 1.0

vendor:ciscomodel:smart software manager on-premscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-006874 // NVD: CVE-2020-3245

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3245
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3245
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-006874
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202006-1142
value: MEDIUM

Trust: 0.6

VULHUB: VHN-181370
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-3245
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-006874
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181370
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3245
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3245
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-006874
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-181370 // JVNDB: JVNDB-2020-006874 // CNNVD: CNNVD-202006-1142 // NVD: CVE-2020-3245 // NVD: CVE-2020-3245

PROBLEMTYPE DATA

problemtype:CWE-862

Trust: 1.9

problemtype:CWE-284

Trust: 1.0

sources: VULHUB: VHN-181370 // JVNDB: JVNDB-2020-006874 // NVD: CVE-2020-3245

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202006-1142

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-202006-1142

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-006874

PATCH

title:cisco-sa-on-prem-access-ctrl-fpQRfdpfurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-on-prem-access-ctrl-fpQRfdpf

Trust: 0.8

title:Cisco Smart Software Manager On-Prem Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=121835

Trust: 0.6

sources: JVNDB: JVNDB-2020-006874 // CNNVD: CNNVD-202006-1142

EXTERNAL IDS

db:NVDid:CVE-2020-3245

Trust: 2.5

db:JVNDBid:JVNDB-2020-006874

Trust: 0.8

db:CNNVDid:CNNVD-202006-1142

Trust: 0.7

db:AUSCERTid:ESB-2020.2127

Trust: 0.6

db:CNVDid:CNVD-2020-34289

Trust: 0.1

db:VULHUBid:VHN-181370

Trust: 0.1

sources: VULHUB: VHN-181370 // JVNDB: JVNDB-2020-006874 // CNNVD: CNNVD-202006-1142 // NVD: CVE-2020-3245

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-on-prem-access-ctrl-fpqrfdpf

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-3245

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3245

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.2127/

Trust: 0.6

sources: VULHUB: VHN-181370 // JVNDB: JVNDB-2020-006874 // CNNVD: CNNVD-202006-1142 // NVD: CVE-2020-3245

SOURCES

db:VULHUBid:VHN-181370
db:JVNDBid:JVNDB-2020-006874
db:CNNVDid:CNNVD-202006-1142
db:NVDid:CVE-2020-3245

LAST UPDATE DATE

2024-11-23T22:11:27.847000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181370date:2020-06-23T00:00:00
db:JVNDBid:JVNDB-2020-006874date:2020-07-22T00:00:00
db:CNNVDid:CNNVD-202006-1142date:2020-06-30T00:00:00
db:NVDid:CVE-2020-3245date:2024-11-21T05:30:38.840

SOURCES RELEASE DATE

db:VULHUBid:VHN-181370date:2020-06-18T00:00:00
db:JVNDBid:JVNDB-2020-006874date:2020-07-22T00:00:00
db:CNNVDid:CNNVD-202006-1142date:2020-06-17T00:00:00
db:NVDid:CVE-2020-3245date:2020-06-18T03:15:11.760