{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T23:55:47.495","vulnerabilities":[{"cve":{"id":"CVE-2020-3379","sourceIdentifier":"psirt@cisco.com","published":"2020-07-16T18:15:18.690","lastModified":"2024-11-21T05:30:54.907","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Cisco SD-WAN Solution Software could allow an authenticated, local attacker to elevate privileges to Administrator on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain administrative privileges."},{"lang":"es","value":"Una vulnerabilidad en Cisco SD-WAN Solution Software podría permitir a un atacante local autenticado elevar los privilegios a Administrator en el sistema operativo subyacente. La vulnerabilidad es debido a una comprobación de entrada insuficiente. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición diseñada hacia un sistema afectado. Una explotación con éxito podría permitir al atacante conseguir privilegios administrativos"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":3.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-264"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"18.3.0","matchCriteriaId":"484C01EF-C2DE-43DB-8C3F-C2C013A182FE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*","matchCriteriaId":"00AAB4DD-1C45-412F-84AA-C056A0BBFB9A"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*","matchCriteriaId":"F019975D-3A45-4522-9CB9-F4258C371DF6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*","matchCriteriaId":"0811E0B5-889E-451E-B754-A8FEE32BDFA2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*","matchCriteriaId":"36973815-F46D-4ADA-B9DF-BCB70AC60BD3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*","matchCriteriaId":"061A302C-8D35-4E80-93DA-916DA7E90C06"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*","matchCriteriaId":"140AF13E-4463-478B-AA94-97406A80CB86"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*","matchCriteriaId":"1356861D-E6CA-4973-9597-629507E8C07E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*","matchCriteriaId":"BA648664-0734-4D02-8944-CA4DF4D756D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"2F16884C-A2EE-4867-8806-6418E000078C"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmpresc-SyzcS4kC","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmpresc-SyzcS4kC","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}