First published: Thu Jan 24 2019(Updated: )
A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, adjacent attacker to bypass authentication and have direct unauthorized access to other vSmart containers. The vulnerability is due to an insecure default configuration of the affected system. An attacker could exploit this vulnerability by directly connecting to the exposed services. An exploit could allow the attacker to retrieve and modify critical system files.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | <18.4.0 | |
Cisco Vsmart Controller | ||
<18.4.0 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-1647.
The severity level of CVE-2019-1647 is high.
An attacker can exploit CVE-2019-1647 by bypassing authentication and gaining direct unauthorized access to other vSmart containers.
The Cisco SD-WAN Solution with a version up to and excluding 18.4.0, as well as the Cisco Vsmart Controller, are affected by CVE-2019-1647.
To fix CVE-2019-1647, users should apply the necessary updates provided by Cisco and ensure that the system is not using an insecure default configuration.