First published: Thu Mar 19 2020(Updated: )
A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain root-level privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN firmware | <18.4.5 | |
Cisco SD-WAN firmware | >=19.2.0<19.2.2 | |
Cisco SD-WAN firmware | =20.1.0 | |
Cisco vEdge Cloud | ||
Cisco vManage Network Management System | ||
Cisco SD-WAN vSmart Controller | ||
Cisco 1100-4g/6g Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco vEdge 100 Router | ||
Cisco vEdge 1000 Router | ||
Cisco vEdge 100b Router | ||
Cisco vEdge 100m router | ||
Cisco vEdge 100wm router | ||
Cisco vEdge 2000 router | ||
Cisco vEdge-5000 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-3265.
The severity of CVE-2020-3265 is high with a CVSS score of 7.8.
This vulnerability affects Cisco SD-WAN Solution software.
The impact of CVE-2020-3265 is that an authenticated, local attacker could elevate privileges to root on the underlying operating system.
To fix CVE-2020-3265, update Cisco SD-WAN Solution software to a version that is not vulnerable.