First published: Wed Mar 24 2021(Updated: )
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to view arbitrary files on the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwpathtrav-nsrue2Mt
Credit: This vulnerability was found by James Spadaro III Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxe-sdwpathtrav-nsrue2Mt is considered high due to the potential for unauthorized access to sensitive files.
To fix cisco-sa-iosxe-sdwpathtrav-nsrue2Mt, users should apply the latest security patches provided by Cisco for IOS XE SD-WAN Software.
Cisco IOS XE SD-WAN Software users are affected by cisco-sa-iosxe-sdwpathtrav-nsrue2Mt, especially those with local authenticated access.
cisco-sa-iosxe-sdwpathtrav-nsrue2Mt facilitates path traversal attacks allowing access to restricted files.
cisco-sa-iosxe-sdwpathtrav-nsrue2Mt is not remotely exploitable as it requires local authentication.