{"api_version":"1","generated_at":"2026-04-23T06:20:55+00:00","cve":"CVE-2023-20098","urls":{"html":"https://cve.report/CVE-2023-20098","api":"https://cve.report/api/cve/CVE-2023-20098.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-20098","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-20098"},"summary":{"title":"CVE-2023-20098","description":"A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files.\r\n\r This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root.","state":"PUBLIC","assigner":"psirt@cisco.com","published_at":"2023-05-09 18:15:00","updated_at":"2024-01-25 17:15:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch","name":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch","refsource":"MISC","tags":[],"title":"Cisco vManage - Unauthorized data access (CVE-2023-20098) · Advisory · orangecertcc/security-research · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN","name":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN","refsource":"MISC","tags":[],"title":"Cisco SD-WAN vManage Software Arbitrary File Deletion Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-20098","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20098","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"20098","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"catalyst_sd-wan_manager","cpe6":"20.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"20098","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"sd-wan_vmanage","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"20098","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"sd-wan_vmanage","cpe6":"20.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-20098","qid":"317322","title":"Cisco SD-WAN vManage Software Arbitrary File Deletion Vulnerability (cisco-sa-sdwan-vmanage-wfnqmYhN)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-20098","ASSIGNER":"psirt@cisco.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files.\r\n\r This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Cisco","product":{"product_data":[{"product_name":"Cisco SD-WAN vManage","version":{"version_data":[{"version_affected":"=","version_value":"20.9.1"},{"version_affected":"=","version_value":"20.9.2"}]}}]}}]}},"references":{"reference_data":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN","refsource":"MISC","name":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN"},{"url":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch","refsource":"MISC","name":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch"}]},"source":{"advisory":"cisco-sa-sdwan-vmanage-wfnqmYhN","discovery":"EXTERNAL","defects":["CSCwd42486"]},"exploit":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"impact":{"cvss":[{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N","baseScore":4.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}]}},"nvd":{"publishedDate":"2023-05-09 18:15:00","lastModifiedDate":"2024-01-25 17:15:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.8,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*","versionEndExcluding":"20.9.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}