First published: Thu Jun 20 2019(Updated: )
A vulnerability in the CLI of Cisco SD-WAN Solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow the attacker to make configuration changes to the system as the root user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sd-wan Firmware | <18.3.6 | |
Cisco Sd-wan Firmware | =18.4.0 | |
Cisco Vedge-100 | ||
Cisco Vedge-1000 | ||
Cisco Vedge-2000 | ||
Cisco Vedge-5000 | ||
Cisco Vedge 100b | ||
Cisco Vedge 100m | ||
Cisco Vedge 100wm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Cisco SD-WAN Solution vulnerability is CVE-2019-1625.
The severity rating of CVE-2019-1625 is high, with a severity value of 7.8.
An attacker can exploit CVE-2019-1625 by authenticating as a local user and elevating lower-level privileges to the root user on an affected device.
Cisco SD-WAN Solution versions up to and including 18.3.6 are affected by CVE-2019-1625. Version 18.4.0 is also affected.
To fix CVE-2019-1625, users should update to a version of Cisco SD-WAN Solution that is not affected (e.g., version 18.4.1 or higher). Cisco has released patches to address this vulnerability.