First published: Fri Nov 15 2024(Updated: )
A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to inject arbitrary commands on an affected system and cause a denial of service (DoS) condition. This vulnerability is due to improper input validation of user-supplied input to the device template configuration. An attacker could exploit this vulnerability by submitting crafted input to the device template configuration. A successful exploit could allow the attacker to cause a DoS condition on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1484 has been rated as a high severity vulnerability due to its potential to allow remote command injection.
To mitigate CVE-2021-1484, it is recommended to update the Cisco SD-WAN vManage Software to the latest version provided by Cisco.
CVE-2021-1484 affects systems running Cisco SD-WAN vManage Software that have improper input validation.
Yes, CVE-2021-1484 can lead to a denial of service condition if exploited by an authenticated attacker.
There are no official workarounds for CVE-2021-1484; applying software updates is the recommended approach.