Vulnerability Name: | CVE-2020-3400 (CCN-188769) |
Assigned: | 2019-12-12 |
Published: | 2020-09-24 |
Updated: | 2020-11-24 |
Summary: | A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to utilize parts of the web UI for which they are not authorized.The vulnerability is due to insufficient authorization of web UI access requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web UI. A successful exploit could allow the attacker to utilize parts of the web UI for which they are not authorized. This could allow a Read-Only user to perform actions of an Admin user.
|
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): Single_Instance | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-862
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2020-3400
Source: XF Type: UNKNOWN cisco-cve20203400-sec-bypass(188769)
Source: CCN Type: Cisco Security Advisory cisco-sa-webui-auth-bypass-6j2BYUc7 Cisco IOS XE Software Web UI Authorization Bypass Vulnerability
Source: CISCO Type: Vendor Advisory 20200924 Cisco IOS XE Software Web UI Authorization Bypass Vulnerability
|
Vulnerable Configuration: | Configuration 1: cpe:/o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*OR cpe:/o:cisco:ios_xe:17.2.1t:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:cisco:ios_xe_software:*:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |