First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | =18.2.0 | |
Cisco SD-WAN | =18.3.0 | |
Cisco SD-WAN | =18.3.8 | |
Cisco SD-WAN | =18.4.6 | |
Cisco SD-WAN | =19.2.3 | |
Cisco SD-WAN | =19.2.99 | |
Cisco SD-WAN | =20.1.0 | |
Cisco vSmart Controller Firmware | ||
Cisco vEdge Router | ||
Cisco vEdge Router | ||
Cisco vEdge 100b | ||
Cisco vEdge 100m router | ||
Cisco vEdge 100wm | ||
Cisco vEdge 2000 | ||
Cisco vEdge 5000 | ||
Cisco vEdge Cloud | ||
Cisco Catalyst SD-WAN Manager | ||
Cisco vBond Orchestrator |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1298 is a vulnerability in Cisco SD-WAN products that could allow an authenticated attacker to perform command injection attacks.
CVE-2021-1298 has a severity rating of 8.8 (critical).
Cisco SD-WAN firmware versions 18.2.0, 18.3.0, 18.3.8, 18.4.6, 19.2.3, 19.2.99, and 20.1.0 are affected by CVE-2021-1298.
An attacker with authenticated access could exploit CVE-2021-1298 by performing command injection attacks on an affected device.
You can find more information about CVE-2021-1298 on the Cisco Security Advisory page: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn