First published: Fri Oct 05 2018(Updated: )
A vulnerability in the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass certificate validation on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by supplying a system image signed with a crafted certificate to an affected device, bypassing the certificate validation. An exploit could allow an attacker to deploy a crafted system image.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | >=17.2.0<17.2.8 | |
Cisco SD-WAN | =18.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco SD-WAN Solution vulnerability is CVE-2018-15387.
The severity level of CVE-2018-15387 is critical, with a CVSS score of 9.8.
An unauthenticated remote attacker can exploit CVE-2018-15387 by bypassing certificate validation on an affected device.
Cisco SD-WAN Solution versions between 17.2.0 and 17.2.8, as well as version 18.3.0, are affected by CVE-2018-15387.
Yes, you can find more information about CVE-2018-15387 at the following references: [securityfocus.com](http://www.securityfocus.com/bid/105509) and [cisco.com](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-sd-wan-bypass).