// For flags

CVE-2020-27130

Cisco Security Manager Path Traversal Vulnerability

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability in Cisco Security Manager could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper validation of directory traversal character sequences within requests to an affected device. An attacker could exploit this vulnerability by sending a crafted request to the affected device. A successful exploit could allow the attacker to download arbitrary files from the affected device.

Una vulnerabilidad en Cisco Security Manager podría permitir a un atacante no autenticado remoto conseguir acceso a información confidencial. Una vulnerabilidad es debido a una comprobación inapropiada de unas secuencias de caracteres de salto de directorio dentro de unas peticiones para un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición diseñada hacia el dispositivo afectado. Una explotación con éxito podría permitir a un atacante descargar archivos del dispositivo afectado

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2020-10-13 CVE Reserved
  • 2020-11-17 CVE Published
  • 2024-09-05 EPSS Updated
  • 2024-11-13 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-35: Path Traversal: '.../...//'
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Security Manager
Search vendor "Cisco" for product "Security Manager"
<= 4.21
Search vendor "Cisco" for product "Security Manager" and version " <= 4.21"
-
Affected