QID 317311

Date Published: 2023-03-27

QID 317311: Cisco Internetwork Operating System (IOS) XE SD-WAN Software Command Injection Vulnerability (cisco-sa-ios-xe-sdwan-VQAhEjYw)

A vulnerability in the CLI of Cisco IOS XE SD WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges.

Affected Products:
This vulnerability affects the following Cisco products if they are running a vulnerable release of universal Cisco IOS XE Software in controller mode or a vulnerable release of standalone Cisco IOS XE SD WAN Software:
1000 Series Integrated Services Routers (ISR)
4000 Series ISR
ASR 1000 Series Aggregation Services Routers
Catalyst 8000 Edge Platforms Family
Cloud Services Router (CSR) 1000V Series
Note: The standalone Cisco IOS XE SD-WAN Software release images are separate from the universal Cisco IOS XE Software release images.

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 3.6 severity.
  • Solution

    Customers are advised to refer to cisco-sa-ios-xe-sdwan-VQAhEjYw for more information.

    CVEs related to QID 317311

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-ios-xe-sdwan-VQAhEjYw URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sdwan-VQAhEjYw