A vulnerability in the web management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct directory traversal attacks and obtain read and write access to sensitive files on a targeted system. The vulnerability is due to a lack of proper validation of files that are uploaded to an affected device. An attacker could exploit this vulnerability by uploading a crafted file to an affected system. An exploit could allow the attacker to view or modify arbitrary files on the targeted system.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmdirtrav-eFdAxsJg | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2020-07-15T00:00:00
Updated: 2020-07-16T17:22:00
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3381
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-07-16T18:15:18.907
Modified: 2023-05-23T13:55:46.380
Link: CVE-2020-3381
JSON object: View
Redhat Information
No data.
CWE