First published: Wed Jul 18 2018(Updated: )
A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the request admin-tech command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the request admin-tech command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180718-sdwan-fo is rated as high due to the potential for authenticated remote attackers to overwrite arbitrary files.
To fix cisco-sa-20180718-sdwan-fo, users should upgrade to the latest version of the Cisco SD-WAN Solution software that addresses this vulnerability.
cisco-sa-20180718-sdwan-fo allows an authenticated attacker to execute arbitrary file overwriting, potentially compromising the device's operating system.
Cisco SD-WAN Solution users with vulnerable software versions are affected by cisco-sa-20180718-sdwan-fo.
cisco-sa-20180718-sdwan-fo enables an authenticated remote file overwrite attack on the underlying operating system.