First published: Wed Jun 02 2021(Updated: )
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges on an affected system. This vulnerability exists because the affected software does not properly restrict access to privileged processes. An attacker could exploit this vulnerability by invoking a privileged process in the affected system. A successful exploit could allow the attacker to perform actions with the privileges of the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-fuErCWwF
Credit: Julien Legras Synacktiv
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN Solution | =20.5<20.5.1=20.4<20.4.2 | 20.5.1 20.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sd-wan-fuErCWwF is classified as high due to the potential for an authenticated attacker to gain elevated privileges.
To fix cisco-sa-sd-wan-fuErCWwF, upgrade to the latest fixed version of Cisco SD-WAN Software as recommended in the advisory.
Cisco SD-WAN Software versions 20.4 and 20.5 are affected by cisco-sa-sd-wan-fuErCWwF up to 20.4.2 and 20.5.1 respectively.
The vulnerability in cisco-sa-sd-wan-fuErCWwF can be exploited by an authenticated, local attacker.
Exploitation of cisco-sa-sd-wan-fuErCWwF can lead to elevated privileges on the affected system, potentially allowing attackers to execute unauthorized commands.