{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-20254","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2022-10-27T18:47:50.372Z","datePublished":"2023-09-27T17:11:23.280Z","dateUpdated":"2025-12-16T18:23:21.286Z"},"containers":{"cna":{"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2024-01-25T16:58:33.089Z"},"descriptions":[{"lang":"en","value":"A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability requires the multi-tenant feature to be enabled.\r\n\r This vulnerability is due to insufficient user session management within the Cisco Catalyst SD-WAN Manager system. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain unauthorized access to information about another tenant, make configuration changes, or possibly take a tenant offline causing a denial of service condition."}],"affected":[{"vendor":"Cisco","product":"Cisco SD-WAN vManage","versions":[{"version":"17.2.6","status":"affected"},{"version":"17.2.7","status":"affected"},{"version":"17.2.8","status":"affected"},{"version":"17.2.9","status":"affected"},{"version":"17.2.10","status":"affected"},{"version":"17.2.4","status":"affected"},{"version":"17.2.5","status":"affected"},{"version":"18.3.1.1","status":"affected"},{"version":"18.3.3.1","status":"affected"},{"version":"18.3.3","status":"affected"},{"version":"18.3.4","status":"affected"},{"version":"18.3.5","status":"affected"},{"version":"18.3.7","status":"affected"},{"version":"18.3.8","status":"affected"},{"version":"18.3.6.1","status":"affected"},{"version":"18.3.1","status":"affected"},{"version":"18.3.0","status":"affected"},{"version":"18.4.0.1","status":"affected"},{"version":"18.4.3","status":"affected"},{"version":"18.4.302","status":"affected"},{"version":"18.4.303","status":"affected"},{"version":"18.4.4","status":"affected"},{"version":"18.4.5","status":"affected"},{"version":"18.4.0","status":"affected"},{"version":"18.4.1","status":"affected"},{"version":"18.4.6","status":"affected"},{"version":"19.2.0","status":"affected"},{"version":"19.2.097","status":"affected"},{"version":"19.2.099","status":"affected"},{"version":"19.2.1","status":"affected"},{"version":"19.2.2","status":"affected"},{"version":"19.2.3","status":"affected"},{"version":"19.2.31","status":"affected"},{"version":"19.2.929","status":"affected"},{"version":"19.2.4","status":"affected"},{"version":"20.1.1.1","status":"affected"},{"version":"20.1.12","status":"affected"},{"version":"20.1.1","status":"affected"},{"version":"20.1.2","status":"affected"},{"version":"20.1.3","status":"affected"},{"version":"19.3.0","status":"affected"},{"version":"19.1.0","status":"affected"},{"version":"18.2.0","status":"affected"},{"version":"20.3.1","status":"affected"},{"version":"20.3.2","status":"affected"},{"version":"20.3.2.1","status":"affected"},{"version":"20.3.3","status":"affected"},{"version":"20.3.3.1","status":"affected"},{"version":"20.3.4","status":"affected"},{"version":"20.3.4.1","status":"affected"},{"version":"20.3.4.2","status":"affected"},{"version":"20.3.5","status":"affected"},{"version":"20.3.6","status":"affected"},{"version":"20.3.7","status":"affected"},{"version":"20.3.7.1","status":"affected"},{"version":"20.3.4.3","status":"affected"},{"version":"20.3.5.1","status":"affected"},{"version":"20.3.7.2","status":"affected"},{"version":"20.4.1","status":"affected"},{"version":"20.4.1.1","status":"affected"},{"version":"20.4.1.2","status":"affected"},{"version":"20.4.2","status":"affected"},{"version":"20.4.2.2","status":"affected"},{"version":"20.4.2.1","status":"affected"},{"version":"20.4.2.3","status":"affected"},{"version":"20.5.1","status":"affected"},{"version":"20.5.1.2","status":"affected"},{"version":"20.5.1.1","status":"affected"},{"version":"20.6.1","status":"affected"},{"version":"20.6.1.1","status":"affected"},{"version":"20.6.2.1","status":"affected"},{"version":"20.6.2.2","status":"affected"},{"version":"20.6.2","status":"affected"},{"version":"20.6.3","status":"affected"},{"version":"20.6.3.1","status":"affected"},{"version":"20.6.1.2","status":"affected"},{"version":"20.6.3.2","status":"affected"},{"version":"20.6.3.3","status":"affected"},{"version":"20.6.3.0.45","status":"affected"},{"version":"20.6.3.0.46","status":"affected"},{"version":"20.6.3.0.47","status":"affected"},{"version":"20.7.1","status":"affected"},{"version":"20.7.1.1","status":"affected"},{"version":"20.7.2","status":"affected"},{"version":"20.8.1","status":"affected"},{"version":"20.9.1","status":"affected"},{"version":"20.9.2","status":"affected"},{"version":"20.9.2.1","status":"affected"},{"version":"20.9.3","status":"affected"},{"version":"20.9.3.1","status":"affected"},{"version":"20.9.2.3","status":"affected"},{"version":"20.9.3.0.12","status":"affected"},{"version":"20.9.3.0.16","status":"affected"},{"version":"20.9.3.0.17","status":"affected"},{"version":"20.9.3.0.18","status":"affected"},{"version":"20.9.3.0.20","status":"affected"},{"version":"20.9.3.0.21","status":"affected"},{"version":"20.9.3.0.23","status":"affected"},{"version":"20.10.1","status":"affected"},{"version":"20.10.1.1","status":"affected"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z","name":"cisco-sa-sdwan-vman-sc-LRLfu2z"}],"metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."}],"source":{"advisory":"cisco-sa-sdwan-vman-sc-LRLfu2z","discovery":"INTERNAL","defects":["CSCwf68936","CSCwf55823"]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T09:05:36.889Z"},"title":"CVE Program Container","references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z","name":"cisco-sa-sdwan-vman-sc-LRLfu2z","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-20254","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2023-11-15T16:37:43.965360Z"}}}],"affected":[{"cpes":["cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*"],"vendor":"cisco","product":"catalyst_sd-wan_manager","versions":[{"status":"affected","version":"17.2.10","versionType":"custom","lessThanOrEqual":"20.9.3.1"}],"defaultStatus":"unknown"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-16T18:23:21.286Z"}}]}}