ID

VAR-202007-1034


CVE

CVE-2020-3405


TITLE

Cisco SD-WAN vManage In software XML External entity vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-008343

DESCRIPTION

A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application. Cisco SD-WAN vManage The software XML There is a vulnerability in an external entity.Information may be obtained and tampered with. Cisco SD-WAN vManage Software is a management software for SD-WAN (Software Defined Wide Area Network) solutions from Cisco. A code issue vulnerability exists in the Web UI in Cisco SD-WAN vManage Software 19.2.2 and earlier versions

Trust: 1.71

sources: NVD: CVE-2020-3405 // JVNDB: JVNDB-2020-008343 // VULHUB: VHN-181530

AFFECTED PRODUCTS

vendor:ciscomodel:sd-wanscope:lteversion:19.2.2

Trust: 1.0

vendor:ciscomodel:sd-wanscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-008343 // NVD: CVE-2020-3405

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3405
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3405
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-008343
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202007-1061
value: HIGH

Trust: 0.6

VULHUB: VHN-181530
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-3405
severity: MEDIUM
baseScore: 4.9
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-008343
severity: MEDIUM
baseScore: 4.9
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181530
severity: MEDIUM
baseScore: 4.9
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3405
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.1
impactScore: 5.2
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2020-3405
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.0

NVD: JVNDB-2020-008343
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-181530 // JVNDB: JVNDB-2020-008343 // CNNVD: CNNVD-202007-1061 // NVD: CVE-2020-3405 // NVD: CVE-2020-3405

PROBLEMTYPE DATA

problemtype:CWE-611

Trust: 1.9

sources: VULHUB: VHN-181530 // JVNDB: JVNDB-2020-008343 // NVD: CVE-2020-3405

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202007-1061

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202007-1061

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-008343

PATCH

title:cisco-sa-vmanxml-Aj4GFEKdurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanxml-Aj4GFEKd

Trust: 0.8

title:Cisco SD-WAN vManage Software Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=124910

Trust: 0.6

sources: JVNDB: JVNDB-2020-008343 // CNNVD: CNNVD-202007-1061

EXTERNAL IDS

db:NVDid:CVE-2020-3405

Trust: 2.5

db:JVNDBid:JVNDB-2020-008343

Trust: 0.8

db:CNNVDid:CNNVD-202007-1061

Trust: 0.7

db:NSFOCUSid:47436

Trust: 0.6

db:AUSCERTid:ESB-2020.2424

Trust: 0.6

db:CNVDid:CNVD-2020-41237

Trust: 0.1

db:VULHUBid:VHN-181530

Trust: 0.1

sources: VULHUB: VHN-181530 // JVNDB: JVNDB-2020-008343 // CNNVD: CNNVD-202007-1061 // NVD: CVE-2020-3405

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-vmanxml-aj4gfekd

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-3405

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3405

Trust: 0.8

url:http://www.nsfocus.net/vulndb/47436

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2424/

Trust: 0.6

sources: VULHUB: VHN-181530 // JVNDB: JVNDB-2020-008343 // CNNVD: CNNVD-202007-1061 // NVD: CVE-2020-3405

SOURCES

db:VULHUBid:VHN-181530
db:JVNDBid:JVNDB-2020-008343
db:CNNVDid:CNNVD-202007-1061
db:NVDid:CVE-2020-3405

LAST UPDATE DATE

2024-11-23T21:35:30.459000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181530date:2020-07-23T00:00:00
db:JVNDBid:JVNDB-2020-008343date:2020-09-08T00:00:00
db:CNNVDid:CNNVD-202007-1061date:2020-08-05T00:00:00
db:NVDid:CVE-2020-3405date:2024-11-21T05:30:58.017

SOURCES RELEASE DATE

db:VULHUBid:VHN-181530date:2020-07-16T00:00:00
db:JVNDBid:JVNDB-2020-008343date:2020-09-08T00:00:00
db:CNNVDid:CNNVD-202007-1061date:2020-07-15T00:00:00
db:NVDid:CVE-2020-3405date:2020-07-16T18:15:19.407