First published: Wed Sep 28 2022(Updated: )
A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv
Credit: by James Spadaro the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases | >=16.9<=16.10<16.10.1 | 16.10.1 |
Cisco SD-WAN Solution | >=18.3 and earlier<=18.4<18.4.5 | 18.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.