Vulnerability Details CVE-2023-20179
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content.
This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.0%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2023-20179
-
cpe:2.3:a:cisco:sd-wan_vmanage:-
-
cpe:2.3:a:cisco:sd-wan_vmanage:17.2.10
-
cpe:2.3:a:cisco:sd-wan_vmanage:17.2.4
-
cpe:2.3:a:cisco:sd-wan_vmanage:17.2.5
-
cpe:2.3:a:cisco:sd-wan_vmanage:17.2.6
-
cpe:2.3:a:cisco:sd-wan_vmanage:17.2.7
-
cpe:2.3:a:cisco:sd-wan_vmanage:17.2.8
-
cpe:2.3:a:cisco:sd-wan_vmanage:17.2.9
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.2.0
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.0
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.1.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.3
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.3.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.4
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.5
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.6.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.7
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.3.8
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.4.0
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.4.0.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.4.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.4.3
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.4.302
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.4.303
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.4.4
-
cpe:2.3:a:cisco:sd-wan_vmanage:18.4.5
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.1.0
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.2.0
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.2.097
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.2.099
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.2.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.2.2
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.2.3
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.2.31
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.2.929
-
cpe:2.3:a:cisco:sd-wan_vmanage:19.3.0
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.1.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.1.1.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.1.12
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.3
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.3.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.3.2
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.4
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.4.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.4.2
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.5
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.5.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.6
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.2
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.3
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.3.3
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.3.4
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.4
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.4.2
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.6.5.5
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.7
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.7.2
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.8
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.9
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.9.1
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.9.3
-
cpe:2.3:a:cisco:sd-wan_vmanage:20.9.3.2