First published: Wed Sep 22 2021(Updated: )
A vulnerability in a specific CLI command that is run on Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the configuration database of an affected device. This vulnerability is due to insufficient validation of specific CLI command parameters. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of the configuration database and gain root-level access to an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-arbfileov-MVOF3ZZn This advisory is part of the September 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: by James Spadaro the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-iosxesdwan-arbfileov-MVOF3ZZn vulnerability is rated as high severity due to its potential impact on system integrity.
To fix cisco-sa-iosxesdwan-arbfileov-MVOF3ZZn, you should apply the recommended software updates provided by Cisco.
Devices running specific versions of Cisco IOS XE SD-WAN Software are affected by the cisco-sa-iosxesdwan-arbfileov-MVOF3ZZn vulnerability.
Exploitation of cisco-sa-iosxesdwan-arbfileov-MVOF3ZZn requires authenticated, local access to the affected device.
An attacker exploiting cisco-sa-iosxesdwan-arbfileov-MVOF3ZZn could overwrite arbitrary files in the configuration database, potentially compromising the device.