First published: Wed Sep 05 2018(Updated: )
A vulnerability in the error reporting feature of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the error reporting application configuration. An attacker could exploit this vulnerability by sending a crafted command to the error reporting feature. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-20180905-sd-wan-escalation has been rated as a high severity vulnerability due to its potential for privilege escalation.
To fix cisco-sa-20180905-sd-wan-escalation, update the Cisco SD-WAN Solution to a version that addresses the vulnerability.
The cisco-sa-20180905-sd-wan-escalation affects all versions of the Cisco SD-WAN Solution that contain the vulnerable error reporting feature.
The cisco-sa-20180905-sd-wan-escalation vulnerability facilitates remote authenticated attackers to gain elevated privileges.
Yes, the exploitation of cisco-sa-20180905-sd-wan-escalation requires an authenticated user to perform the attack.