ID

VAR-202011-0735


CVE

CVE-2020-27130


TITLE

Cisco Security Manager  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-013617

DESCRIPTION

A vulnerability in Cisco Security Manager could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within requests to an affected device. An attacker could exploit this vulnerability by sending a crafted request to the affected device. A successful exploit could allow the attacker to download arbitrary files from the affected device. Cisco Security Manager (CSM) is a set of enterprise-level management applications from Cisco, which is mainly used to configure firewall, VPN and intrusion prevention security services on Cisco network and security devices

Trust: 1.71

sources: NVD: CVE-2020-27130 // JVNDB: JVNDB-2020-013617 // VULHUB: VHN-370507

AFFECTED PRODUCTS

vendor:ciscomodel:security managerscope:lteversion:4.21

Trust: 1.0

vendor:シスコシステムズmodel:cisco security managerscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-013617 // NVD: CVE-2020-27130

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-27130
value: CRITICAL

Trust: 1.0

ykramarz@cisco.com: CVE-2020-27130
value: CRITICAL

Trust: 1.0

NVD: CVE-2020-27130
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202011-1486
value: CRITICAL

Trust: 0.6

VULHUB: VHN-370507
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-27130
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-370507
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-27130
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 2.0

NVD: CVE-2020-27130
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-370507 // JVNDB: JVNDB-2020-013617 // CNNVD: CNNVD-202011-1486 // NVD: CVE-2020-27130 // NVD: CVE-2020-27130

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-35

Trust: 1.0

problemtype:Other (CWE-Other) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-013617 // NVD: CVE-2020-27130

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202011-1486

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202011-1486

PATCH

title:cisco-sa-csm-path-trav-NgeRnqgRurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-path-trav-NgeRnqgR

Trust: 0.8

title:Cisco Security Manager Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=134234

Trust: 0.6

sources: JVNDB: JVNDB-2020-013617 // CNNVD: CNNVD-202011-1486

EXTERNAL IDS

db:NVDid:CVE-2020-27130

Trust: 2.5

db:JVNDBid:JVNDB-2020-013617

Trust: 0.8

db:AUSCERTid:ESB-2020.4074

Trust: 0.6

db:CNNVDid:CNNVD-202011-1486

Trust: 0.6

db:VULHUBid:VHN-370507

Trust: 0.1

sources: VULHUB: VHN-370507 // JVNDB: JVNDB-2020-013617 // CNNVD: CNNVD-202011-1486 // NVD: CVE-2020-27130

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-csm-path-trav-ngernqgr

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-27130

Trust: 1.4

url:https://www.auscert.org.au/bulletins/esb-2020.4074/

Trust: 0.6

sources: VULHUB: VHN-370507 // JVNDB: JVNDB-2020-013617 // CNNVD: CNNVD-202011-1486 // NVD: CVE-2020-27130

SOURCES

db:VULHUBid:VHN-370507
db:JVNDBid:JVNDB-2020-013617
db:CNNVDid:CNNVD-202011-1486
db:NVDid:CVE-2020-27130

LAST UPDATE DATE

2024-11-23T23:07:46.928000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-370507date:2020-11-30T00:00:00
db:JVNDBid:JVNDB-2020-013617date:2021-07-08T08:28:00
db:CNNVDid:CNNVD-202011-1486date:2020-12-02T00:00:00
db:NVDid:CVE-2020-27130date:2024-11-21T05:20:46.133

SOURCES RELEASE DATE

db:VULHUBid:VHN-370507date:2020-11-17T00:00:00
db:JVNDBid:JVNDB-2020-013617date:2021-07-08T00:00:00
db:CNNVDid:CNNVD-202011-1486date:2020-11-16T00:00:00
db:NVDid:CVE-2020-27130date:2020-11-17T04:15:12.053