QID 317129
Date Published: 2022-02-01
QID 317129: Cisco Internetwork Operating System (IOS) XE SD-WAN Software Command Injection Vulnerability (cisco-sa-ioxesdwan-clicmdinj-7bYX5k3)
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated,
local attacker to execute arbitrary commands with elevated privileges on an affected device.
Affected Products:
Following Cisco products if they are running a vulnerable release of Cisco IOS XE SD-WAN Software and have the SD-WAN feature enabled:
1000 Series Integrated Services Routers (ISRs)
4000 Series ISRs
ASR 1000 Series Aggregation Services Routers
Cloud Services Router 1000V Series
Note: The SD-WAN feature is not enabled by default.
QID Detection Logic (Authenticated):
The check matches Cisco IOS XE SDWAN version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability.
Customers are advised to refer to cisco-sa-ioxesdwan-clicmdinj-7bYX5k3 for more information.
- cisco-sa-ioxesdwan-clicmdinj-7bYX5k3 -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3
CVEs related to QID 317129
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-ioxesdwan-clicmdinj-7bYX5k3 |
|