First published: Wed Jan 20 2021(Updated: )
Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn
Credit: The following vulnerabilities were found during the resolution a Cisco TAC support caseCVE-2021-1261. The following vulnerabilities were found during internal security testing:
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN | =20.4<20.4.1=20.3<20.3.2>=19.3<=20.1<20.1.2>=.3<18=18.3=18.4<=19.2<19.2.4 | 20.4.1 20.3.2 20.1.2 19.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The Cisco SD-WAN command injection vulnerability is a security flaw that allows an authenticated attacker to execute arbitrary commands with root privileges on an affected device.
The Cisco SD-WAN command injection vulnerability has a severity rating of 9.9 (critical).
The command injection vulnerability affects Cisco SD-WAN products.
The vulnerability affects Cisco SD-WAN versions 20.4, 20.3, 20.1, and 19.2.
To fix the vulnerability, update your Cisco SD-WAN products to versions 20.4.1, 20.3.2, 20.1.2, or 19.2.4.