First published: Wed Jun 19 2019(Updated: )
A vulnerability in the CLI of Cisco SD-WAN Solution could allow an authenticated, local attacker to elevate lower-level privileges to the root user on an affected device. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. A successful exploit could allow the attacker to make configuration changes to the system as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-sdwan-privesca
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190619-sdwan-privesca is considered high due to the potential for privilege escalation.
To fix cisco-sa-20190619-sdwan-privesca, users should implement the recommended patches and updates provided by Cisco.
Cisco SD-WAN Solution users are affected by cisco-sa-20190619-sdwan-privesca if they have not applied the necessary security updates.
cisco-sa-20190619-sdwan-privesca allows an attacker to elevate privileges to the root user on affected devices.
Yes, local access is required for an attacker to exploit cisco-sa-20190619-sdwan-privesca.