First published: Thu Jan 24 2019(Updated: )
A vulnerability in the vContainer of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to cause a denial of service (DoS) condition and execute arbitrary code as the root user. The vulnerability is due to improper bounds checking by the vContainer. An attacker could exploit this vulnerability by sending a malicious file to an affected vContainer instance. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected vContainer, which could result in a DoS condition that the attacker could use to execute arbitrary code as the root user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Vsmart Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1651 is a vulnerability in the vContainer of the Cisco SD-WAN Solution that could allow an authenticated remote attacker to cause a denial of service (DoS) condition and execute arbitrary code as the root user.
CVE-2019-1651 has a severity rating of 8.8, which is considered critical.
The Cisco Vsmart Controller is affected by CVE-2019-1651.
An attacker could exploit CVE-2019-1651 by exploiting the improper bounds checking by the vContainer.
Yes, Cisco has provided security advisories and patches to address the vulnerability. Please refer to the Cisco Security Advisory for more information.