Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-20179

CVSS 4.3 · Medium EPSS 0.08% · P24
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-20179

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Catalyst SD-WAN Manager 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Catalyst是美国思科(Cisco)公司的一系列交换机。 Cisco Catalyst SD-WAN Manager 存在安全漏洞,该漏洞源于基于 Web 的管理界面中存在漏洞,可能允许经过身份验证的远程攻击者注入 HTML 内容。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco SD-WAN vManage 20.3.1 -

II. Public POCs for CVE-2023-20179

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-20179

登录查看更多情报信息。

Same Patch Batch · Cisco · 2023-09-27 · 18 CVEs total

CVE-2023-202529.8 CRITICALCisco Catalyst SD-WAN Manager 授权问题漏洞
CVE-2023-202318.8 HIGHCisco IOS XE Software 输入验证错误漏洞
CVE-2023-201878.6 HIGHCisco IOS XE Software 安全漏洞
CVE-2023-202278.6 HIGHCisco IOS XE Software 安全漏洞
CVE-2023-202268.6 HIGHCisco IOS XE Software 安全漏洞
CVE-2023-202238.6 HIGHCisco DNA Center 安全漏洞
CVE-2023-200338.6 HIGHCisco IOS XE Software 安全漏洞
CVE-2023-201868.0 HIGHCisco IOS 安全漏洞
CVE-2023-200347.5 HIGHCisco SD-WAN vManage 安全漏洞
CVE-2023-202547.2 HIGHCisco Catalyst 安全漏洞
CVE-2023-202537.1 HIGHCisco SD-WAN vManage 安全漏洞
CVE-2023-201096.6 MEDIUMCisco IOS 缓冲区错误漏洞
CVE-2023-202026.1 MEDIUMCisco IOS XE Software 安全漏洞
CVE-2023-202516.1 MEDIUMCisco Wireless LAN Controller 缓冲区错误漏洞
CVE-2023-201765.8 MEDIUMCisco Access Point 资源管理错误漏洞
CVE-2023-202625.3 MEDIUMCisco Catalyst SD-WAN Manager 安全漏洞
CVE-2023-202684.7 MEDIUMCisco Access Point Software Uncontrolled Resource Consumption Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2023-20179

No comments yet


Leave a comment