{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T19:37:11.451","vulnerabilities":[{"cve":{"id":"CVE-2020-3372","sourceIdentifier":"psirt@cisco.com","published":"2020-07-16T18:15:18.487","lastModified":"2024-11-21T05:30:54.057","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to consume excessive system memory and cause a denial of service (DoS) condition on an affected system. The vulnerability is due to inefficient memory management. An attacker could exploit this vulnerability by sending a large number of crafted HTTP requests to the affected web-based management interface. A successful exploit could allow the attacker to exhaust system memory, which could cause the system to stop processing new connections and could result in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de administración basada en web de Cisco SD-WAN vManage Software podría permitir a un atacante remoto autenticado consumir memoria excesiva del sistema y causar una condición de denegación de servicio (DoS) sobre un sistema afectado. La vulnerabilidad es debido a una gestión de memoria ineficiente. Un atacante podría explotar esta vulnerabilidad mediante el envío de una gran cantidad de peticiones HTTP diseñadas a la interfaz de administración basada en web afectada. Una explotación con éxito podría permitir a un atacante agotar la memoria del sistema, lo que podría causar que el sistema deje de procesar nuevas conexiones y podría resultar en una condición DoS"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"19.2.3","matchCriteriaId":"C0D4C4CE-E286-45C7-AFA7-B876D15C6FCD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"20.1.0","versionEndExcluding":"20.1.12","matchCriteriaId":"D243D326-0D82-4B1E-A306-B8FDBA940F63"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"0F77CD6A-83DA-4F31-A128-AD6DAECD623B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"62564BB8-1282-4597-A645-056298BE7CCB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"2B68B363-3C57-4E95-8B13-0F9B59D551F7"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*","matchCriteriaId":"00AAB4DD-1C45-412F-84AA-C056A0BBFB9A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*","matchCriteriaId":"F019975D-3A45-4522-9CB9-F4258C371DF6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*","matchCriteriaId":"0811E0B5-889E-451E-B754-A8FEE32BDFA2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*","matchCriteriaId":"36973815-F46D-4ADA-B9DF-BCB70AC60BD3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*","matchCriteriaId":"061A302C-8D35-4E80-93DA-916DA7E90C06"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*","matchCriteriaId":"140AF13E-4463-478B-AA94-97406A80CB86"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*","matchCriteriaId":"1356861D-E6CA-4973-9597-629507E8C07E"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-emvman-3y6LuTcZ","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-emvman-3y6LuTcZ","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}