CVE-2018-6961
Summary
| CVE | CVE-2018-6961 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-06-11 22:29:00 UTC |
| Updated | 2019-10-03 00:03:00 UTC |
| Description | VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution. |
Risk And Classification
EPSS: 0.936410000 probability, percentile 0.998450000 (date 2026-05-12)
CISA KEV: Listed on 2022-03-25; due 2022-04-15; ransomware use Unknown
Problem Types: CWE-78
CISA Known Exploited Vulnerability
| Vendor | VMware |
|---|---|
| Product | SD-WAN Edge |
| Name | VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2018-6961 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Vmware | Nsx Sd-wan By Velocloud | All | All | All | All |
| Application | Vmware | Nsx Sd-wan By Velocloud | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| VMSA-2018-0011.1 | CONFIRM | www.vmware.com | Vendor Advisory |
| VMware NSX SD-WAN Edge < 3.1.2 - Command Injection - Hardware webapps Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| VMware SD-WAN Edge CVE-2018-6961 Command Injection Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| VMware NSX SD-WAN Edge Local Web User Interface Command Injection Flaw Lets Local Users Gain Elevated Privileges - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.