First published: Wed Mar 24 2021(Updated: )
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwcinj-t68PPW7m
Credit: Orange Group.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco-SA-XESDWCINJ-T68PPW7M is considered high due to the potential for remote command injection with root privileges.
To fix Cisco-SA-XESDWCINJ-T68PPW7M, update the affected Cisco IOS XE SD-WAN Software to the latest patched version provided by Cisco.
Cisco-SA-XESDWCINJ-T68PPW7M affects users of the Cisco IOS XE SD-WAN Software who have local authenticated access.
Cisco-SA-XESDWCINJ-T68PPW7M enables an authenticated local attacker to execute arbitrary commands on the underlying operating system.
Yes, authentication is required for exploiting Cisco-SA-XESDWCINJ-T68PPW7M, as the vulnerability affects only authenticated users.