First published: Wed Jul 15 2020(Updated: )
A vulnerability in the web management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct directory traversal attacks and obtain read and write access to sensitive files on a targeted system. The vulnerability is due to a lack of proper validation of files that are uploaded to an affected device. An attacker could exploit this vulnerability by uploading a crafted file to an affected system. An exploit could allow the attacker to view or modify arbitrary files on the targeted system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmdirtrav-eFdAxsJg
Credit: Johnny Yu Walmart security
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco SD-WAN vManage | >=.3<18=18.3=18.4<=19.2<19.2.3 | 19.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-vmdirtrav-eFdAxsJg is considered to be high due to its potential for directory traversal attacks.
To fix cisco-sa-vmdirtrav-eFdAxsJg, update to a version of Cisco SD-WAN vManage Software that is not vulnerable, specifically versions above 19.2.3.
Cisco SD-WAN vManage Software versions up to 19.2.3 are affected by cisco-sa-vmdirtrav-eFdAxsJg.
cisco-sa-vmdirtrav-eFdAxsJg allows authenticated remote attackers to conduct directory traversal attacks.
The impact of cisco-sa-vmdirtrav-eFdAxsJg includes obtaining read and write access to sensitive files on a targeted system.