First published: Wed Jan 23 2019(Updated: )
A vulnerability in the vContainer of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to cause a denial of service (DoS) condition and execute arbitrary code as the root user. The vulnerability is due to improper bounds checking by the vContainer. An attacker could exploit this vulnerability by sending a malicious file to an affected vContainer instance. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected vContainer, which could result in a DoS condition that the attacker could use to execute arbitrary code as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-bo
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190123-sdwan-bo is high, as it can lead to denial of service and arbitrary code execution.
To fix cisco-sa-20190123-sdwan-bo, update your Cisco SD-WAN Solution to the latest firmware version provided by Cisco.
Users of the Cisco SD-WAN Solution are affected by cisco-sa-20190123-sdwan-bo.
cisco-sa-20190123-sdwan-bo can facilitate a denial of service attack and potentially allow remote code execution.
Yes, authentication is required to exploit the cisco-sa-20190123-sdwan-bo vulnerability.