First published: Wed Jun 03 2020(Updated: )
A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, physical attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. The vulnerability exists because the affected software has insufficient authentication mechanisms for certain commands. An attacker could exploit this vulnerability by stopping the boot initialization of an affected device. A successful exploit could allow the attacker to bypass authentication and gain unrestricted access to the root shell of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-auth-b-NzwhJHH7
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco-SA-AUTH-B-NzwhJHH7 is critical due to the potential for unauthorized access to the root shell.
To fix Cisco-SA-AUTH-B-NzwhJHH7, upgrade to the latest version of Cisco IOS XE SD-WAN Software that addresses this vulnerability.
Organizations using Cisco IOS XE SD-WAN Software versions lacking sufficient authentication mechanisms are affected by Cisco-SA-AUTH-B-NzwhJHH7.
The potential impacts of Cisco-SA-AUTH-B-NzwhJHH7 include unauthorized access and control over network devices.
No official workaround is recommended for Cisco-SA-AUTH-B-NzwhJHH7; the best course is to apply the appropriate software updates.