CVE-2023-20254
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability requires the multi-tenant feature to be enabled.
This vulnerability is due to insufficient user session management within the Cisco Catalyst SD-WAN Manager system. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain unauthorized access to information about another tenant, make configuration changes, or possibly take a tenant offline causing a denial of service condition.
Una vulnerabilidad en el sistema de gestión de sesiones de la función multiinquilino de Cisco Catalyst SD-WAN Manager podría permitir que un atacante remoto autenticado acceda a otro tenant que está siendo administrado por la misma instancia de Cisco Catalyst SD-WAN Manager. Esta vulnerabilidad requiere que esté habilitada la función multi-tenant. Esta vulnerabilidad se debe a una gestión insuficiente de la sesión de usuario dentro del sistema Cisco Catalyst SD-WAN Manager. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud manipulada a un sistema afectado. Un exploit exitoso podría permitir al atacante obtener acceso no autorizado a información sobre otro tenant, realizar cambios en la configuración o posiblemente desconectar a un tenant, provocando una condición de denegación de servicio.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2022-10-27 CVE Reserved
- 2023-09-27 CVE Published
- 2024-10-03 EPSS Updated
- 2024-10-23 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z | 2023-09-29 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Sd-wan Manager Search vendor "Cisco" for product "Sd-wan Manager" | < 20.6.3.4 Search vendor "Cisco" for product "Sd-wan Manager" and version " < 20.6.3.4" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Sd-wan Manager Search vendor "Cisco" for product "Sd-wan Manager" | >= 20.7 < 20.9.3.2 Search vendor "Cisco" for product "Sd-wan Manager" and version " >= 20.7 < 20.9.3.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Sd-wan Manager Search vendor "Cisco" for product "Sd-wan Manager" | >= 20.10 < 20.10.1.2 Search vendor "Cisco" for product "Sd-wan Manager" and version " >= 20.10 < 20.10.1.2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Sd-wan Manager Search vendor "Cisco" for product "Sd-wan Manager" | >= 20.11 < 20.11.1.2 Search vendor "Cisco" for product "Sd-wan Manager" and version " >= 20.11 < 20.11.1.2" | - |
Affected
|