First published: Wed May 05 2021(Updated: )
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ
Credit: CVE-2021-1275: This vulnerability was found during the resolution a Cisco TAC support caseCVE-2021-1468 Cisco during internal security testingCVE-2021-1506: These vulnerabilities were found by N.S. Cisco during internal security testingCVE-2021-1505 Cisco during internal security testingCVE-2021-1508: These vulnerabilities were found by Alex Lumsden Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN Solution | =20.5<20.5.1=20.4<20.4.1>=18.4 and earlier=19.2=20.1<=20.3<20.3.3 | 20.5.1 20.4.1 20.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)