Cisco SD-WAN vManage XSS via unsanitized input
CVE-2024-20475 Published on September 25, 2024
Cisco SD-WAN vManage Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.
Vulnerability Analysis
CVE-2024-20475 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2024-20475 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2024-20475
stack.watch emails you whenever new vulnerabilities are published in Cisco Catalyst Sd Wan Manager or Cisco Sd Wan Vmanage. Just hit a watch button to start following.
Affected Versions
Cisco Catalyst SD-WAN Manager:- Version 20.6.1 is affected.
- Version 20.6.1.1 is affected.
- Version 20.6.0.18.3 is affected.
- Version 20.6.0.18.4 is affected.
- Version 20.6.1.0.1 is affected.
- Version 20.6.2 is affected.
- Version 20.7.1EFT2 is affected.
- Version 20.7.1 is affected.
- Version 20.6.2.1 is affected.
- Version 20.6.2.2 is affected.
- Version 20.7.1.1 is affected.
- Version 20.6.2.2.2 is affected.
- Version 20.6.2.2.3 is affected.
- Version 20.6.2.0.4 is affected.
- Version 20.6.2.2.7 is affected.
- Version 20.6.3 is affected.
- Version 20.7.1.0.2 is affected.
- Version 20.8.1 is affected.
- Version 20.6.3.0.7 is affected.
- Version 20.6.3.0.5 is affected.
- Version 20.6.3.0.10 is affected.
- Version 20.6.3.0.2 is affected.
- Version 20.7.2 is affected.
- Version 20.6.3.0.11 is affected.
- Version 20.6.3.0.14 is affected.
- Version 20.6.3.0.19 is affected.
- Version 20.6.3.0.18 is affected.
- Version 20.6.3.0.23 is affected.
- Version 20.6.3.0.25 is affected.
- Version 20.6.3.0.27 is affected.
- Version 20.6.3.0.29 is affected.
- Version 20.10.1 is affected.
- Version 20.6.3.0.33 is affected.
- Version 20.9.1_LI_Images is affected.
- Version 20.10.1_LI_Images is affected.
- Version 20.9.3 is affected.
- Version 20.6.5.1 is affected.
- Version 20.11.1 is affected.
- Version 20.11.1_LI_Images is affected.
- Version 20.9.3_LI_ Images is affected.
- Version 20.6.3.1.1 is affected.
- Version 20.9.3.0.3 is affected.
- Version 20.6.3.2 is affected.
- Version 20.6.4.1 is affected.
- Version 20.6.3.0.39 is affected.
- Version 20.6.5.2 is affected.
- Version 20.10.1.1 is affected.
- Version 20.6.2.2.4 is affected.
- Version 20.6.1.2 is affected.
- Version 20.11.1.1 is affected.
- Version 20.6.3.0.40 is affected.
- Version 20.9.2.2 is affected.
- Version 20.6.5.2.3 is affected.
- Version 20.6.5.1.5 is affected.
- Version 20.9.3.0.4 is affected.
- Version 20.6.4.0.19 is affected.
- Version 20.6.3.3 is affected.
- Version 20.6.5.4 is affected.
- Version 20.6.5.1.7 is affected.
- Version 20.9.3.0.12 is affected.
- Version 20.11.1.2 is affected.
- Version 20.6.3.4 is affected.
- Version 20.10.1.2 is affected.
- Version 20.6.5.1.10 is affected.
- Version 20.6.5.2.4 is affected.
- Version 20.9.3.0.18 is affected.
- Version 20.6.3.0.47 is affected.
- Version 20.9.2.3 is affected.
- Version 20.9.3.0.21 is affected.
- Version 20.9.4_LI_Images is affected.
- Version 20.9.4 is affected.
- Version 20.6.5.1.11 is affected.
- Version 20.12.1 is affected.
- Version 20.12.1_LI_Images is affected.
- Version 20.9.3.0.23 is affected.
- Version 20.9.4.1 is affected.
- Version 20.9.4.1_LI_Images is affected.
- Version 20.9.3.0.25 is affected.
- Version 20.9.3.0.24 is affected.
- Version 20.6.5.1.14 is affected.
- Version 20.9.3.0.26 is affected.
- Version 20.6.3.0.51 is affected.
- Version 20.12.2 is affected.
- Version 20.12.2_LI_Images is affected.
- Version 20.6.6.0.1 is affected.
- Version 20.13.1_LI_Images is affected.
- Version 20.9.4.0.4 is affected.
- Version 20.13.1 is affected.
- Version 20.9.4.1.1 is affected.
- Version 20.9.5 is affected.
- Version 20.9.5_LI_Images is affected.
- Version 20.12.3_LI_Images is affected.
- Version 20.12.3 is affected.
- Version 20.9.4.1.3 is affected.
- Version 20.6.7 is affected.
- Version 20.9.5.1 is affected.
- Version 20.9.5.1_LI_Images is affected.
- Version 20.14.1 is affected.
- Version 20.14.1_LI_Images is affected.
- Version 20.9.5.2_LI_Images is affected.
- Version 20.12.3.1 is affected.
- Version 20.12.4 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.