First published: Wed Oct 03 2018(Updated: )
A vulnerability in the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass certificate validation on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by supplying a system image signed with a crafted certificate to an affected device, bypassing the certificate validation. An exploit could allow an attacker to deploy a crafted system image. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-sd-wan-bypass
Credit: This vulnerability was reported to Cisco by Joe Ksiazek a security researcher with Exelon.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20181003-sd-wan-bypass is considered critical due to the impact it can have on system integrity.
To fix cisco-sa-20181003-sd-wan-bypass, update your Cisco SD-WAN software to the latest version that contains the security patches.
Organizations using vulnerable versions of Cisco SD-WAN Solution are at risk of exploitation from cisco-sa-20181003-sd-wan-bypass.
Yes, cisco-sa-20181003-sd-wan-bypass allows unauthenticated remote attackers to exploit the vulnerability.
The vulnerability in cisco-sa-20181003-sd-wan-bypass is caused by improper certificate validation in the Cisco SD-WAN Solution.