SB2020111705 - Multiple vulnerabilities in Cisco Security Manager
Published: November 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2020-27130)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and download arbitrary files from the system.
Successful exploitation of this vulnerability can lead to full system compromise.
2) Use of hard-coded credentials (CVE-ID: CVE-2020-27125)
The vulnerability allows a remote attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code. A remote unauthenticated attacker can access the affected system using the hard-coded credentials.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-path-trav-NgeRnqgR
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu99995
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-rce-8gjUz9fW
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu99938