CVE-2020-3222 (CNNVD-202006-329)
中文标题:
Cisco IOS XE 安全漏洞
英文标题:
Cisco IOS XE Software Web UI Unauthenticated Proxy Service Vulnerability
漏洞描述
中文描述:
Cisco IOS XE是美国思科(Cisco)公司的一套为其网络设备开发的操作系统。 Cisco IOS XE Software中的Web UI存在安全漏洞,该漏洞源于在该UI的特定端点上存在代理服务。攻击者可通过连接代理服务利用该漏洞绕过访问限制。
英文描述:
A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass access control restrictions on an affected device. The vulnerability is due to the presence of a proxy service at a specific endpoint of the web UI. An attacker could exploit this vulnerability by connecting to the proxy service. An exploit could allow the attacker to bypass access restrictions on the network by proxying their access request through the management network of the affected device. As the proxy is reached over the management virtual routing and forwarding (VRF), this could reduce the effectiveness of the bypass.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco IOS XE Software 16.10.1 | n/a | - | - |
cpe:2.3:a:cisco:cisco_ios_xe_software_16.10.1:n_a:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.1 | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.1a | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.1b | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.1c | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.1d | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.1e | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.1f | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.1g | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.1s | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.10.2 | - | - |
cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.11.1 | - | - |
cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.11.1a | - | - |
cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.11.1b | - | - |
cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.11.1c | - | - |
cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.11.1s | - | - |
cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.12.1 | - | - |
cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.12.1a | - | - |
cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.12.1c | - | - |
cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.12.1s | - | - |
cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.12.1t | - | - |
cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.12.1w | - | - |
cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*
|
| cisco | ios_xe | 16.12.1y | - | - |
cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
MEDIUMCVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3222 |
2025-11-11 15:20:36 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3222 |
2025-11-11 14:56:59 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202006-329 |
2025-11-11 15:10:26 | 2025-11-11 07:56:15 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202006-329
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 23
- data_sources: ['cve'] -> ['cve', 'nvd']