CVE-2020-3297

critical-risk
Published 2020-07-02

A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.

Do I need to act?

~
5.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (20)

Sg250X-24 Firmware
Sg250X-24P Firmware
Sg250X-48 Firmware
Sg250X-48P Firmware
Sg250-08 Firmware
Sg250-08Hp Firmware
Sg250-10P Firmware
Sg250-18 Firmware
Sg250-26 Firmware
Sg250-26Hp Firmware
Sg250-26P Firmware
Sg250-50 Firmware
Sg250-50Hp Firmware
Sg250-50P Firmware
Sf250-24 Firmware
Sf250-24P Firmware
Sf250-48 Firmware
Sf250-48Hp Firmware

Affected Vendors

71
/ 100
critical-risk
Severity 32/34 · Critical
Exploitability 8/34 · Low
Exposure 31/34 · Critical