First published: Wed Jan 22 2020(Updated: )
A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, local attacker to gain unauthorized access to an affected device. The vulnerability is due to the existence of default credentials within the default configuration of an affected device. An attacker who has access to an affected device could log in with elevated privileges. A successful exploit could allow the attacker to take complete control of the device. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-cred-EVGSF259
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco SA SD-WAN Cred EVGSF259 is rated as critical due to the potential for unauthorized access to affected devices.
To fix Cisco SA SD-WAN Cred EVGSF259, ensure that default credentials are changed and not left in the default state.
Cisco SA SD-WAN Cred EVGSF259 affects devices running the Cisco IOS XE SD-WAN Software.
An unauthenticated local attacker can exploit Cisco SA SD-WAN Cred EVGSF259 to gain unauthorized access.
There are no specific workarounds for Cisco SA SD-WAN Cred EVGSF259; the best practice is to change any default credentials.