First published: Thu Apr 08 2021(Updated: )
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager | >=20.4<20.4.1 | |
Cisco SD-WAN vManage | <19.2.4 | |
Cisco SD-WAN vManage | >=19.3<20.3.3 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security advisory is CVE-2021-1479.
The severity of CVE-2021-1479 is critical with a CVSS score of 9.8.
The affected software includes Cisco Catalyst SD-WAN Manager, Cisco SD-WAN vManage versions up to 19.2.4, and Cisco SD-WAN vManage versions between 19.3 and 20.3.3.
The potential impacts of CVE-2021-1479 include remote code execution by an unauthenticated attacker and privilege escalation by a local attacker.
For more information about CVE-2021-1479, you can refer to the Cisco Security Advisory: [https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy)