{"api_version":"1","generated_at":"2026-05-13T19:55:50+00:00","cve":"CVE-2018-6961","urls":{"html":"https://cve.report/CVE-2018-6961","api":"https://cve.report/api/cve/CVE-2018-6961.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-6961","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-6961"},"summary":{"title":"CVE-2018-6961","description":"VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.","state":"PUBLIC","assigner":"security@vmware.com","published_at":"2018-06-11 22:29:00","updated_at":"2019-10-03 00:03:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"http://www.vmware.com/security/advisories/VMSA-2018-0011.html","name":"http://www.vmware.com/security/advisories/VMSA-2018-0011.html","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"VMSA-2018-0011.1","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/44959/","name":"44959","refsource":"EXPLOIT-DB","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"VMware NSX SD-WAN Edge < 3.1.2 - Command Injection - Hardware webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/104185","name":"104185","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"VMware SD-WAN Edge CVE-2018-6961 Command Injection Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1041210","name":"1041210","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"VMware NSX SD-WAN Edge Local Web User Interface Command Injection Flaw Lets Local Users Gain Elevated Privileges - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-6961","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-6961","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"6961","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vmware","cpe5":"nsx_sd-wan_by_velocloud","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"6961","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vmware","cpe5":"nsx_sd-wan_by_velocloud","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2018","cve_id":"6961","cve":"CVE-2018-6961","vendorProject":"VMware","product":"SD-WAN Edge","vulnerabilityName":"VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability","dateAdded":"2022-03-25","shortDescription":"VMware SD-WAN Edge by VeloCloud contains a command injection vulnerability in the local web UI component. Successful exploitation of this issue could result in remote code execution.","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-04-15","knownRansomwareCampaignUse":"Unknown","notes":"https://nvd.nist.gov/vuln/detail/CVE-2018-6961","cwes":"CWE-78","catalogVersion":"2026.05.13","updated_at":"2026-05-13 18:47:24"},"epss":{"cve_year":"2018","cve_id":"6961","cve":"CVE-2018-6961","epss":"0.936410000","percentile":"0.998450000","score_date":"2026-05-12","updated_at":"2026-05-13 00:11:55"},"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@vmware.com","DATE_PUBLIC":"2018-06-11T00:00:00","ID":"CVE-2018-6961","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"NSX SD-WAN by VeloCloud","version":{"version_data":[{"version_value":"prior to version 3.1.0"}]}}]},"vendor_name":"VMware"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Command Injection"}]}]},"references":{"reference_data":[{"name":"104185","refsource":"BID","url":"http://www.securityfocus.com/bid/104185"},{"name":"44959","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/44959/"},{"name":"1041210","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1041210"},{"name":"http://www.vmware.com/security/advisories/VMSA-2018-0011.html","refsource":"CONFIRM","url":"http://www.vmware.com/security/advisories/VMSA-2018-0011.html"}]}},"nvd":{"publishedDate":"2018-06-11 22:29:00","lastModifiedDate":"2019-10-03 00:03:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vmware:nsx_sd-wan_by_velocloud:*:*:*:*:*:*:*:*","versionEndExcluding":"3.1.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"6961","Ordinal":"123195","Title":"CVE-2018-6961","CVE":"CVE-2018-6961","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"6961","Ordinal":"1","NoteData":"VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"6961","Ordinal":"2","NoteData":"2018-06-11","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"6961","Ordinal":"3","NoteData":"2018-07-04","Type":"Other","Title":"Modified"}]}}}