QID 317130

Date Published: 2022-02-03

QID 317130: Cisco Internetwork Operating System (IOS) XE SD-WAN Software Command Injection Vulnerability (cisco-sa-sdwan-maapi-privesc-KSUg7QSS)

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated,
local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system.

Affected Products:
Following Cisco products if they are running a vulnerable release of Cisco IOS XE SD-WAN Software and have the SD-WAN feature enabled:
1000 Series Integrated Services Routers (ISRs)
4000 Series ISRs
ASR 1000 Series Aggregation Services Routers
Cloud Services Router 1000V Series
Note: The SD-WAN feature is not enabled by default.

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE SDWAN version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to execute commands with root-level privileges.

  • CVSS V3 rated as High - 6.7 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution

    Customers are advised to refer to cisco-sa-sdwan-maapi-privesc-KSUg7QSS for more information.

    CVEs related to QID 317130

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-sdwan-maapi-privesc-KSUg7QSS URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-maapi-privesc-KSUg7QSS