First published: Thu Jul 16 2020(Updated: )
A vulnerability in Cisco SD-WAN Solution Software could allow an authenticated, local attacker to elevate privileges to Administrator on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain administrative privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sd-wan Firmware | <18.3.0 | |
Cisco Vedge 100 | ||
Cisco Vedge 1000 | ||
Cisco Vedge 100b | ||
Cisco Vedge 100m | ||
Cisco Vedge 100wm | ||
Cisco Vedge 2000 | ||
Cisco Vedge 5000 | ||
Cisco Vbond Orchestrator | ||
Cisco Vsmart Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3379 is a vulnerability in Cisco SD-WAN Solution Software that could allow an authenticated local attacker to elevate privileges.
CVE-2020-3379 affects Cisco SD-WAN Solution Software by allowing an authenticated local attacker to elevate privileges to Administrator on the underlying operating system.
CVE-2020-3379 has a severity rating of 7.8 (high).
CVE-2020-3379 affects Cisco SD-WAN Solution Software version up to and excluding 18.3.0.
CVE-2020-3379 can be exploited by sending a crafted request to the affected software.