QID 317128

Date Published: 2022-01-27

QID 317128: Cisco Internetwork Operating System (IOS) XE SD-WAN Software Privilege Escalation Vulnerability (cisco-sa-iosxesdwan-privesc-VP4FG3jD)

A vulnerability in the Cisco IOS XE SD-WAN Software CLI could allow an authenticated, local attacker to elevate privileges and execute arbitrary code on the underlying operating system as the root user. An attacker must be authenticated on an affected device as a PRIV15 user.

Affected Products:
Following Cisco products if they are running a vulnerable release of Cisco IOS XE SD-WAN Software and have the SD-WAN feature enabled:
1000 Series Integrated Services Routers (ISRs)
4000 Series ISRs
ASR 1000 Series Aggregation Services Routers
Cloud Services Router 1000V Series
Note: The SD-WAN feature is not enabled by default.

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE SDWAN version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to read and write changes to the configuration database on the affected device.

  • CVSS V3 rated as High - 6 severity.
  • CVSS V2 rated as High - 6.6 severity.
  • Solution

    cisco-sa-iosxesdwan-privesc-VP4FG3jD for more information.

    CVEs related to QID 317128

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-iosxesdwan-privesc-VP4FG3jD URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxesdwan-privesc-VP4FG3jD