First published: Fri Apr 15 2022(Updated: )
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager | ||
Cisco Sd-wan Solution | ||
Cisco Sd-wan Vbond Orchestrator | ||
Cisco Sd-wan Vedge Cloud | ||
Cisco SD-WAN vEdge Router | ||
Cisco Sd-wan Vsmart Controller Software | ||
Cisco SD-WAN | >=18.4<20.6.1 | |
Cisco SD-WAN | >=20.7<20.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20716 is a vulnerability in the CLI of Cisco SD-WAN Software that could allow an authenticated, local attacker to gain escalated privileges.
CVE-2022-20716 allows an authenticated, local attacker to modify certain files on the affected system, leading to escalated privileges.
Cisco SD-WAN Software versions 18.4 to 20.6.1 and versions 20.7 to 20.7.1 are affected by CVE-2022-20716.
CVE-2022-20716 has a severity rating of 7.8 (high).
To mitigate CVE-2022-20716, Cisco recommends applying the necessary updates provided by Cisco to fix the vulnerability.