First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Sd-wan Firmware | =18.2.0 | |
Cisco Sd-wan Firmware | =18.3.0 | |
Cisco Sd-wan Firmware | =18.3.8 | |
Cisco Sd-wan Firmware | =18.4.6 | |
Cisco Sd-wan Firmware | =19.2.3 | |
Cisco Sd-wan Firmware | =19.2.99 | |
Cisco Sd-wan Firmware | =20.1.0 | |
Cisco Sd-wan Vsmart Controller Firmware | ||
Cisco Vedge 100 Router | ||
Cisco Vedge 1000 Router | ||
Cisco Vedge 100b Router | ||
Cisco Vedge 100m Router | ||
Cisco Vedge 100wm Router | ||
Cisco Vedge 2000 Router | ||
Cisco Vedge 5000 Router | ||
Cisco Vedge Cloud Router | ||
Cisco Catalyst SD-WAN Manager | ||
Cisco Sd-wan Vbond Orchestrator |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-1260 is high.
The affected software for CVE-2021-1260 is Cisco SD-WAN products with firmware versions 18.2.0, 18.3.0, 18.3.8, 18.4.6, 19.2.3, 19.2.99, and 20.1.0.
An attacker with root privileges on the affected device can perform command injection attacks and take certain actions.
To fix CVE-2021-1260, it is recommended to upgrade to a fixed version of Cisco SD-WAN firmware.
More information about CVE-2021-1260 can be found in the Cisco Security Advisory.