QID 317129

Date Published: 2022-02-01

QID 317129: Cisco Internetwork Operating System (IOS) XE SD-WAN Software Command Injection Vulnerability (cisco-sa-ioxesdwan-clicmdinj-7bYX5k3)

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software and Cisco IOS XE Software could allow an authenticated,
local attacker to execute arbitrary commands with elevated privileges on an affected device.

Affected Products:
Following Cisco products if they are running a vulnerable release of Cisco IOS XE SD-WAN Software and have the SD-WAN feature enabled:
1000 Series Integrated Services Routers (ISRs)
4000 Series ISRs
ASR 1000 Series Aggregation Services Routers
Cloud Services Router 1000V Series
Note: The SD-WAN feature is not enabled by default.

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE SDWAN version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system. An attacker would need valid user credentials to exploit this vulnerability.

  • CVSS V3 rated as High - 6.7 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution

    Customers are advised to refer to cisco-sa-ioxesdwan-clicmdinj-7bYX5k3 for more information.

    CVEs related to QID 317129

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-ioxesdwan-clicmdinj-7bYX5k3 URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxesdwan-clicmdinj-7bYX5k3