First published: Thu Apr 08 2021(Updated: )
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager | >=20.4<20.4.1 | |
Cisco SD-WAN vManage | <19.2.4 | |
Cisco SD-WAN vManage | >=19.3<20.3.3 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1480.
The severity of CVE-2021-1480 is high with a CVSS score of 7.8.
The affected software is Cisco Catalyst SD-WAN Manager version 20.4.1 and below, and Cisco SD-WAN vManage versions 19.2.4, 19.3, and 20.3.3.
An unauthenticated remote attacker could execute arbitrary code, and an authenticated local attacker could gain escalated privileges on an affected system.
Cisco has released software updates to address this vulnerability. It is recommended to upgrade to the latest version of Cisco SD-WAN vManage Software.