Vulnerability Name: | CVE-2020-3223 (CCN-182891) |
Assigned: | 2019-12-12 |
Published: | 2020-06-03 |
Updated: | 2020-06-09 |
Summary: | A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker with administrative privileges to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web UI. An exploit could allow the attacker to read arbitrary files from the underlying operating system's filesystem.
|
CVSS v3 Severity: | 4.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) 4.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): High User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None | 4.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N) 3.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): High User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): Single_Instance | Impact Metrics: | Confidentiality (C): Complete Integrity (I): None Availibility (A): None | 6.1 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:M/C:C/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): Multiple_Instances
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-59
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2020-3223
Source: XF Type: UNKNOWN cisco-cve20203223-info-disc(182891)
Source: CCN Type: Cisco Security Advisory cisco-sa-webui-filerd-HngnDYGk Cisco IOS XE Software Web UI Arbitrary File Read Vulnerability
Source: CISCO Type: Patch, Vendor Advisory 20200603 Cisco IOS XE Software Web UI Arbitrary File Read Vulnerability
|
Vulnerable Configuration: | Configuration 1: cpe:/o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:cisco:ios_xe_software:*:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |