First published: Thu Jul 16 2020(Updated: )
A vulnerability in Cisco SD-WAN Solution Software could allow an authenticated, local attacker to elevate privileges to Administrator on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain administrative privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | <18.3.0 | |
Cisco vEdge 100 Router | ||
Cisco vEdge 1000 Router | ||
Cisco vEdge 100b Router | ||
Cisco vEdge 100m router | ||
Cisco vEdge 100wm router | ||
Cisco vEdge 2000 router | ||
Cisco vEdge-5000 firmware | ||
Cisco vBond Orchestrator | ||
Cisco SD-WAN vSmart Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3379 is a vulnerability in Cisco SD-WAN Solution Software that could allow an authenticated local attacker to elevate privileges.
CVE-2020-3379 affects Cisco SD-WAN Solution Software by allowing an authenticated local attacker to elevate privileges to Administrator on the underlying operating system.
CVE-2020-3379 has a severity rating of 7.8 (high).
CVE-2020-3379 affects Cisco SD-WAN Solution Software version up to and excluding 18.3.0.
CVE-2020-3379 can be exploited by sending a crafted request to the affected software.