QID 317130
Date Published: 2022-02-03
QID 317130: Cisco Internetwork Operating System (IOS) XE SD-WAN Software Command Injection Vulnerability (cisco-sa-sdwan-maapi-privesc-KSUg7QSS)
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated,
local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system.
Affected Products:
Following Cisco products if they are running a vulnerable release of Cisco IOS XE SD-WAN Software and have the SD-WAN feature enabled:
1000 Series Integrated Services Routers (ISRs)
4000 Series ISRs
ASR 1000 Series Aggregation Services Routers
Cloud Services Router 1000V Series
Note: The SD-WAN feature is not enabled by default.
QID Detection Logic (Authenticated):
The check matches Cisco IOS XE SDWAN version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
A successful exploit could allow the attacker to execute commands with root-level privileges.
Customers are advised to refer to cisco-sa-sdwan-maapi-privesc-KSUg7QSS for more information.
- cisco-sa-sdwan-maapi-privesc-KSUg7QSS -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-privesc-KSUg7QSS
CVEs related to QID 317130
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-sdwan-maapi-privesc-KSUg7QSS |
|