First published: Wed Mar 24 2021(Updated: )
Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges. These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwpinj-V4weeqzU
Credit: Orange Group for reporting the vulnerability that is described in CVE-2021-1383. The vulnerability that is described in CVE-2021-1454 was found by Cisco during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Standalone IOS XE SD-WAN Releases |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-xesdwpinj-V4weeqzU is classified as high due to the potential for local authenticated attackers to gain root access.
To fix cisco-sa-xesdwpinj-V4weeqzU, update to the latest patched version of Cisco IOS XE SD-WAN Software.
Cisco IOS XE SD-WAN Software users are affected by the vulnerabilities outlined in cisco-sa-xesdwpinj-V4weeqzU.
Authenticated local attacks that exploit insufficient input validation of CLI commands can leverage cisco-sa-xesdwpinj-V4weeqzU.
If immediate patching for cisco-sa-xesdwpinj-V4weeqzU is not possible, consider restricting local access to affected devices until a fix can be applied.