QID 317127

Date Published: 2022-01-20

QID 317127: Cisco Internetwork Operating System (IOS) XE SD-WAN Software Command Injection Vulnerability (cisco-sa-sd-wan-rhpbE34A)

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges.

Affected Products
Following Cisco products if they are running a vulnerable release of universal Cisco IOS XE Software in Controller mode or a vulnerable release of
standalone Cisco IOS XE SD-WAN Software:
1000 Series Integrated Services Routers (ISRs)
4000 Series ISRs
ASR 1000 Series Aggregation Services Routers
Catalyst 8000 Series Edge Platforms
Cloud Services Router (CSR) 1000V Series

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE SDWAN version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 6.9 severity.
  • Solution

    Customers are advised to refer to cisco-sa-sd-wan-rhpbE34A for more information.

    CVEs related to QID 317127

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-sd-wan-rhpbE34A URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A