Vulnerability Details : CVE-2020-3223
A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker with administrative privileges to read arbitrary files on the underlying filesystem of the device. The vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the filesystem and then accessing it through the web UI. An exploit could allow the attacker to read arbitrary files from the underlying operating system's filesystem.
Products affected by CVE-2020-3223
- cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-3223
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 52 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-3223
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:L/Au:S/C:C/I:N/A:N |
8.0
|
6.9
|
NIST | |
4.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N |
0.9
|
3.6
|
Cisco Systems, Inc. | |
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
1.2
|
3.6
|
NIST |
CWE ids for CVE-2020-3223
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by:
- nvd@nist.gov (Primary)
- ykramarz@cisco.com (Secondary)
References for CVE-2020-3223
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-filerd-HngnDYGk
Cisco IOS XE Software Web UI Arbitrary File Read VulnerabilityPatch;Vendor Advisory
Jump to