First published: Thu Jan 24 2019(Updated: )
A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the save command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the save command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Vedge 100 Firmware | ||
Cisco Vedge 100 | ||
Cisco Vedge 1000 Firmware | ||
Cisco Vedge 1000 | ||
Cisco Vedge 2000 Firmware | ||
Cisco Vedge 2000 | ||
Cisco Vedge 5000 Firmware | ||
Cisco Vedge 5000 | ||
Cisco SD-WAN | <18.4.0 | |
Cisco Vbond Orchestrator | ||
Cisco Vmanage Network Management | ||
Cisco Vsmart Controller | ||
All of | ||
Cisco Vedge 100 Firmware | ||
Cisco Vedge 100 | ||
All of | ||
Cisco Vedge 1000 Firmware | ||
Cisco Vedge 1000 | ||
All of | ||
Cisco Vedge 2000 Firmware | ||
Cisco Vedge 2000 | ||
All of | ||
Cisco Vedge 5000 Firmware | ||
Cisco Vedge 5000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1650 is a vulnerability in the Cisco SD-WAN Solution that could allow an authenticated remote attacker to overwrite arbitrary files on the underlying operating system of an affected device.
CVE-2019-1650 has a severity level of 8.8, which is considered critical.
The affected software versions include Cisco Vedge 1000 Firmware, Cisco Vedge 2000 Firmware, Cisco Vedge 5000 Firmware, Cisco SD-WAN up to version 18.4.0, Cisco Vbond Orchestrator, Cisco Vmanage Network Management, and Cisco Vsmart Controller.
An attacker can exploit CVE-2019-1650 by using improper input validation of the save command in the CLI of the affected software to overwrite arbitrary files on the underlying operating system.
Yes, Cisco has released a security advisory with patches and mitigations to address the vulnerability. It is recommended to apply the necessary updates as soon as possible.