QID 317056
Date Published: 2021-09-27
QID 317056: Cisco SD-WAN Software Command Injection Vulnerability (cisco-sa-sdwan-maapi-cmdinjec-znUYTuC)
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands
to be executed with root-level privileges on the underlying operating system of an affected device.
Affected Products
Cisco products if they were running a vulnerable release of Cisco SD-WAN Software:
SD-WAN vBond Orchestrator Software
SD-WAN vEdge Cloud Routers
SD-WAN vEdge Routers
SD-WAN vManage Software
SD-WAN vSmart Controller Software
Note: Support only for SD-WAN vManage and vedge-100-M.
QID detection logic:
The QID checks for Cisco SD WAN version retrieved via Unix Auth using "show system status" command.
A successful exploit could allow the attacker to execute commands with root-level privileges.
Customers are advised to refer to cisco-sa-sdwan-maapi-cmdinjec-znUYTuC for more information.
- cisco-sa-sdwan-maapi-cmdinjec-znUYTuC -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-cmdinjec-znUYTuC
CVEs related to QID 317056
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-sdwan-maapi-cmdinjec-znUYTuC |
|