First published: Thu Jun 20 2019(Updated: )
A vulnerability in the vManage web-based UI (Web UI) of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected vManage device. The vulnerability is due to a failure to properly authorize certain user actions in the device configuration. An attacker could exploit this vulnerability by logging in to the vManage Web UI and sending crafted HTTP requests to vManage. A successful exploit could allow attackers to gain elevated privileges and make changes to the configuration that they would not normally be authorized to make.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sd-wan Firmware | <=18.3.6 | |
Cisco Vedge-100 | ||
Cisco Vedge-1000 | ||
Cisco Vedge-100b | ||
Cisco Vedge-2000 | ||
Cisco Vedge-5000 | ||
Cisco Vedge 100m | ||
Cisco Vedge 100wm |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco SD-WAN Solution vulnerability is CVE-2019-1626.
The severity of CVE-2019-1626 is high with a CVSS score of 8.8.
An attacker can exploit CVE-2019-1626 by gaining elevated privileges on an affected vManage device through the vManage web-based UI (Web UI).
Versions up to and including 18.3.6 of Cisco SD-WAN Firmware are affected by CVE-2019-1626.
You can find more information about CVE-2019-1626 on the Cisco Security Advisory and SecurityFocus website.