CVE-2020-15861

HIGH

Net-snmp < 5.7.3 - Symlink Following

Title source: rule
STIX 2.1

Description

Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.

References (6)

Core 6
Core References
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966599
Third Party Advisory x_refsource_confirm
https://github.com/net-snmp/net-snmp/issues/145
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202008-12
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/4471-1/
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20200904-0001/

Scores

CVSS v3 7.8
EPSS 0.0043
EPSS Percentile 62.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-59
Status published
Products (9)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
net-snmp/net-snmp < 5.7.3
netapp/cloud_backup
netapp/smi-s_provider
netapp/solidfire_\&_hci_management_node
Published Aug 20, 2020
Tracked Since Feb 18, 2026