First published: Wed Sep 28 2022(Updated: )
A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arb-file-delete-VB2rVcQv
Credit: by James Spadaro the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE SD-WAN | >=16.9<=16.10<16.10.1 | 16.10.1 |
Cisco SD-WAN Solution | >=18.3 and earlier<=18.4<18.4.5 | 18.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-arb-file-delete-VB2rVcQv is rated as high due to the potential impact of arbitrary file deletion.
To fix cisco-sa-arb-file-delete-VB2rVcQv, upgrade to the recommended versions of Cisco IOS XE SD-WAN Software or Cisco SD-WAN Software Releases listed in the advisory.
Authenticated local users on affected versions of Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software are at risk from cisco-sa-arb-file-delete-VB2rVcQv.
Exploiting cisco-sa-arb-file-delete-VB2rVcQv allows an attacker to delete arbitrary files from the file system of the affected device.
Versions 16.9 to 16.10 and 18.3 and earlier to 18.4 of specific Cisco software are impacted by cisco-sa-arb-file-delete-VB2rVcQv.