First published: Wed Apr 19 2023(Updated: )
A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files.This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the vulnerability cisco-sa-sdwan-vmanage-wfnqmYhN is considered to be high.
To fix cisco-sa-sdwan-vmanage-wfnqmYhN, you should upgrade to the patched version of Cisco SD-WAN vManage Software as specified in the security advisory.
Organizations using Cisco SD-WAN vManage Software are affected by the vulnerability cisco-sa-sdwan-vmanage-wfnqmYhN.
The vulnerability cisco-sa-sdwan-vmanage-wfnqmYhN can be exploited by an authenticated, local attacker through directory traversal.
The potential impacts of cisco-sa-sdwan-vmanage-wfnqmYhN include unauthorized file deletions which could lead to system disruption.