First published: Wed Mar 24 2021(Updated: )
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The commands are then executed on the device by the root user. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3 This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: This vulnerability was found by Andrew Kim Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3 is high due to its ability to allow execution of arbitrary commands as the root user.
To fix cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3, apply the recommended security patches or updates provided by Cisco for the affected software.
Users of Cisco IOS XE SD-WAN Software are affected by the vulnerability identified as cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3.
An authenticated, local attacker with low privileges can exploit cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3 to execute arbitrary commands.
The impact of cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3 includes potential unauthorized access and control over the underlying operating system.