First published: Wed Jul 18 2018(Updated: )
A vulnerability in the configuration and management service of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to execute arbitrary code with vmanage user privileges or cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient access restrictions to the HTTP management interface of the affected solution. An attacker could exploit this vulnerability by sending a malicious HTTP request to the affected management service through an authenticated device. A successful exploit could allow the attacker to execute arbitrary code with vmanage user privileges or stop HTTP services on an affected system. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180718-sd-wan-code-ex is classified as high due to the potential for authenticated remote code execution and denial of service.
To fix cisco-sa-20180718-sd-wan-code-ex, apply the recommended security patches and updates provided by Cisco for the affected SD-WAN Solution.
Organizations using the Cisco SD-WAN Solution are affected by cisco-sa-20180718-sd-wan-code-ex.
cisco-sa-20180718-sd-wan-code-ex allows an authenticated attacker to execute arbitrary code or create a denial of service condition.
Yes, authentication is required for exploiting cisco-sa-20180718-sd-wan-code-ex as the attacker needs access to the system.