First published: Thu Jun 20 2019(Updated: )
A vulnerability in the vManage web-based UI (Web UI) of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected vManage device. The vulnerability is due to a failure to properly authorize certain user actions in the device configuration. An attacker could exploit this vulnerability by logging in to the vManage Web UI and sending crafted HTTP requests to vManage. A successful exploit could allow attackers to gain elevated privileges and make changes to the configuration that they would not normally be authorized to make.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | <=18.3.6 | |
Cisco vEdge 100b Router | ||
Cisco vEdge-1000 Firmware | ||
Cisco vEdge 100b Firmware | ||
Cisco vEdge 2000 | ||
Cisco vEdge 5000 | ||
Cisco vEdge 100m router | ||
Cisco vEdge 100wm router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco SD-WAN Solution vulnerability is CVE-2019-1626.
The severity of CVE-2019-1626 is high with a CVSS score of 8.8.
An attacker can exploit CVE-2019-1626 by gaining elevated privileges on an affected vManage device through the vManage web-based UI (Web UI).
Versions up to and including 18.3.6 of Cisco SD-WAN Firmware are affected by CVE-2019-1626.
You can find more information about CVE-2019-1626 on the Cisco Security Advisory and SecurityFocus website.