First published: Thu May 06 2021(Updated: )
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager | >=20.4<20.4.1 | |
Cisco Catalyst SD-WAN Manager | >=20.5<20.5.1 | |
Cisco SD-WAN vManage | <19.2.99 | |
Cisco SD-WAN vManage | >=20.3<20.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1508.
CVE-2021-1508 has a severity of 8.8 (Critical).
Cisco SD-WAN vManage Software versions 19.2.99 to 20.5.1 and Cisco Catalyst SD-WAN Manager versions 20.3 to 20.5.1 are affected by CVE-2021-1508.
CVE-2021-1508 could allow an unauthenticated remote attacker to execute arbitrary code, gain access to sensitive information, or allow an authenticated local attacker to gain escalated privileges or unauthorized access to the application.
To fix CVE-2021-1508, it is recommended to upgrade to a fixed version of Cisco SD-WAN vManage Software or Cisco Catalyst SD-WAN Manager.