CWE
20 77
Advisory Published

cisco-sa-sdwan-cmdinjm-9QMSmgcn: Cisco SD-WAN Command Injection Vulnerabilities

First published: Wed Jan 20 2021(Updated: )

Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn

Credit: The following vulnerabilities were found during the resolution a Cisco TAC support caseCVE-2021-1261. The following vulnerabilities were found during internal security testing:

Affected SoftwareAffected VersionHow to fix
Cisco SD-WAN=20.4<20.4.1=20.3<20.3.2>=19.3<=20.1<20.1.2>=.3<18=18.3=18.4<=19.2<19.2.4
20.4.1
20.3.2
20.1.2
19.2.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the Cisco SD-WAN command injection vulnerability?

    The Cisco SD-WAN command injection vulnerability is a security flaw that allows an authenticated attacker to execute arbitrary commands with root privileges on an affected device.

  • How severe is the Cisco SD-WAN command injection vulnerability?

    The Cisco SD-WAN command injection vulnerability has a severity rating of 9.9 (critical).

  • Which Cisco SD-WAN products are affected by the command injection vulnerability?

    The command injection vulnerability affects Cisco SD-WAN products.

  • What versions of Cisco SD-WAN are affected by the command injection vulnerability?

    The vulnerability affects Cisco SD-WAN versions 20.4, 20.3, 20.1, and 19.2.

  • How can I fix the Cisco SD-WAN command injection vulnerability?

    To fix the vulnerability, update your Cisco SD-WAN products to versions 20.4.1, 20.3.2, 20.1.2, or 19.2.4.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203