First published: Wed Apr 13 2022(Updated: )
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-file-access-VW36d28P
Credit: Joris Oversteyns.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN Solution | =20.7<20.7.1>=20.4=20.5<=20.6<20.6.1>=18.4=19.2<=20.3<20.3.6 | 20.7.1 20.6.1 20.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.