First published: Thu Jun 20 2019(Updated: )
A vulnerability in the vManage web-based UI (Web UI) in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the vManage Web UI. A successful exploit could allow the attacker to execute commands with root privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | <18.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco SD-WAN vulnerability is CVE-2019-1624.
The severity rating of CVE-2019-1624 is critical with a score of 8.8.
The affected software for CVE-2019-1624 is Cisco SD-WAN up to version 18.4.0.
The CWE classification for CVE-2019-1624 is CWE-20 and CWE-77.
An authenticated, remote attacker could exploit CVE-2019-1624 by injecting arbitrary commands that are executed with root privileges.