First published: Thu Jul 16 2020(Updated: )
A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to execute code with root privileges on an affected system. The vulnerability is due to insufficient input sanitization during user authentication processing. An attacker could exploit this vulnerability by sending a crafted response to the Cisco SD-WAN vManage Software. A successful exploit could allow the attacker to access the software and execute commands they should not be authorized to execute.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sd-wan Firmware | <=18.3.0 | |
Cisco Sd-wan Firmware | >=18.4.0<19.2.3 | |
Cisco Sd-wan Firmware | >=19.3.0<20.1.1.1 | |
Cisco 1100-4g Integrated Services Router | ||
Cisco 1100-4gltegb Integrated Services Router | ||
Cisco 1100-4gltena Integrated Services Router | ||
Cisco 1100-6g Integrated Services Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3387 is a vulnerability in Cisco SD-WAN vManage Software that could allow an authenticated remote attacker to execute code with root privileges.
The vulnerability in Cisco SD-WAN vManage Software occurs due to insufficient input sanitization during user authentication processing.
The severity level of CVE-2020-3387 is critical, with a CVSS score of 8.8.
The affected versions of Cisco SD-WAN Firmware for CVE-2020-3387 are: 18.3.0, 18.4.0 to 19.2.3, and 19.3.0 to 20.1.1.1.
An authenticated remote attacker can exploit the vulnerability by executing code with root privileges on an affected system.