QID 317056

Date Published: 2021-09-27

QID 317056: Cisco SD-WAN Software Command Injection Vulnerability (cisco-sa-sdwan-maapi-cmdinjec-znUYTuC)

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands
to be executed with root-level privileges on the underlying operating system of an affected device.

Affected Products
Cisco products if they were running a vulnerable release of Cisco SD-WAN Software:
SD-WAN vBond Orchestrator Software
SD-WAN vEdge Cloud Routers
SD-WAN vEdge Routers
SD-WAN vManage Software
SD-WAN vSmart Controller Software
Note: Support only for SD-WAN vManage and vedge-100-M.

QID detection logic:
The QID checks for Cisco SD WAN version retrieved via Unix Auth using "show system status" command.

A successful exploit could allow the attacker to execute commands with root-level privileges.

  • CVSS V2 rated as High - 7.5 severity.
  • Solution

    Customers are advised to refer to cisco-sa-sdwan-maapi-cmdinjec-znUYTuC for more information.

    CVEs related to QID 317056

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-sdwan-maapi-cmdinjec-znUYTuC URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-cmdinjec-znUYTuC