First published: Thu Sep 23 2021(Updated: )
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system of an affected device. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root-level privileges.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | <18.4.6 | |
Cisco SD-WAN | >=19.2.0<19.2.3 | |
Cisco SD-WAN | >=20.1<20.1.2 | |
Cisco SD-WAN | >=20.3<20.3.1 | |
Cisco SD-WAN | >=20.4<20.4.1 | |
Cisco SD-WAN | >=20.5<20.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34726 is a vulnerability in the CLI of Cisco SD-WAN Software that allows an authenticated local attacker to inject arbitrary commands with root-level privileges.
CVE-2021-34726 affects Cisco SD-WAN Software versions up to 20.5.1, allowing an authenticated local attacker to execute arbitrary commands as a privileged user.
CVE-2021-34726 has a severity rating of 6.7 (high).
To fix CVE-2021-34726, it is recommended to upgrade Cisco SD-WAN Software to version 20.5.1 or later.
More information about CVE-2021-34726 can be found in the Cisco Security Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-cmdinjec-znUYTuC.