First published: Wed Nov 04 2020(Updated: )
A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to write arbitrary files to an affected system. The vulnerability is due to improper validation of requests to APIs. An attacker could exploit this vulnerability by sending malicious requests to an API within the affected application. A successful exploit could allow the attacker to conduct directory traversal attacks and write files to an arbitrary location on the targeted system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-file-Y2JSRNRb
Credit: Yaar Hahn Realmode Labs
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-vmanage-file-Y2JSRNRb vulnerability is rated as high severity due to its potential for unauthorized file writing.
To fix cisco-sa-vmanage-file-Y2JSRNRb, apply the necessary patches or updates provided by Cisco for the SD-WAN vManage Software.
The cisco-sa-vmanage-file-Y2JSRNRb vulnerability affects users of Cisco SD-WAN vManage Software.
An attacker exploiting cisco-sa-vmanage-file-Y2JSRNRb could write arbitrary files to the affected Cisco SD-WAN vManage system.
The cisco-sa-vmanage-file-Y2JSRNRb vulnerability is caused by improper validation of requests to APIs in the Cisco SD-WAN vManage Software.