First published: Mon Jun 11 2018(Updated: )
VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Nsx Sd-wan By Velocloud | <3.1.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2018-6961.
The title of this vulnerability is VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability.
The severity level of CVE-2018-6961 is high with a score of 8.1.
To fix the vulnerability, update VMware NSX SD-WAN Edge by VeloCloud to version 3.1.0 or later.
You can find more information about CVE-2018-6961 in the following references: 1. [Security Focus](http://www.securityfocus.com/bid/104185) 2. [Security Tracker](http://www.securitytracker.com/id/1041210) 3. [VMware Security Advisories](http://www.vmware.com/security/advisories/VMSA-2018-0011.html)