First published: Wed Sep 22 2021(Updated: )
A vulnerability in the Cisco IOS XE SD-WAN Software CLI could allow an authenticated, local attacker to overwrite arbitrary files on the local system. This vulnerability is due to improper access controls on files within the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-GjR5pGOm This advisory is part of the September 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sd-wan-GjR5pGOm is classified as high due to the potential for arbitrary file overwrites by an authenticated attacker.
To fix cisco-sa-sd-wan-GjR5pGOm, update to the latest patch or version of Cisco IOS XE SD-WAN Software that addresses this vulnerability.
cisco-sa-sd-wan-GjR5pGOm affects the Cisco IOS XE SD-WAN Software on devices where the improper access controls are present.
Only authenticated local attackers can exploit cisco-sa-sd-wan-GjR5pGOm to overwrite arbitrary files on the system.
The cause of cisco-sa-sd-wan-GjR5pGOm is improper access controls on files within the local file system in Cisco IOS XE SD-WAN Software.