CVE-2023-20113

6.5 MEDIUM

📋 TL;DR

This CSRF vulnerability in Cisco SD-WAN vManage allows unauthenticated attackers to trick authenticated users into performing malicious actions via malicious links. If exploited, attackers can modify configurations or delete accounts with the victim's privileges. All systems running affected vManage software versions are vulnerable.

💻 Affected Systems

Products:
  • Cisco SD-WAN vManage Software
Versions: Multiple versions prior to 20.6.5.1, 20.9.3.4, and 20.10.1.2
Operating Systems: Linux-based appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected vManage versions are vulnerable. The web-based management interface must be accessible for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attacker gains administrative control, modifies network configurations, deletes critical accounts, or disrupts SD-WAN operations.

🟠

Likely Case

Unauthorized configuration changes leading to network disruption, data exposure, or privilege escalation within the vManage environment.

🟢

If Mitigated

Limited impact with proper CSRF protections, network segmentation, and user awareness training preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick authenticated users into clicking malicious links. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.6.5.1, 20.9.3.4, 20.10.1.2 or later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-csrf-76RDbLEh

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate patched version from Cisco Software Center. 3. Follow Cisco SD-WAN vManage upgrade documentation. 4. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Implement CSRF Tokens Manually

linux

Add custom CSRF protection headers to web interface requests

Requires custom web server configuration - consult Cisco documentation for specific implementation

Network Segmentation

linux

Restrict access to vManage web interface to trusted networks only

firewall-cmd --permanent --zone=trusted --add-service=https
firewall-cmd --reload

🧯 If You Can't Patch

  • Implement strict network access controls to limit vManage interface exposure
  • Enable multi-factor authentication and user awareness training about phishing risks

🔍 How to Verify

Check if Vulnerable:

Check vManage version via CLI: show version | include vManage

Check Version:

show version | include vManage

Verify Fix Applied:

Verify version is 20.6.5.1, 20.9.3.4, 20.10.1.2 or later: show version | include vManage

📡 Detection & Monitoring

Log Indicators:

  • Unexpected configuration changes
  • Account deletion/modification events
  • Multiple failed login attempts followed by successful changes

Network Indicators:

  • Unusual HTTP POST requests to vManage interface from unexpected sources
  • CSRF token validation failures

SIEM Query:

source="vmanage" AND (event_type="config_change" OR event_type="user_modification") AND user_agent CONTAINS "malicious"

🔗 References

📤 Share & Export