Cisco Security Advisory - Cisco IOS XE SD-WAN Software Arbitrary Command Execution Vulnerability

Started by Netwörkheäd, April 02, 2021, 12:40:39 AM

Previous topic - Next topic

Netwörkheäd

Cisco IOS XE SD-WAN Software Arbitrary Command Execution Vulnerability

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability.


This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The commands are then executed on the device by the root user. A successful exploit could allow the attacker to execute arbitrary commands as the root user.


Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.


This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3




This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.



     
         
Security Impact Rating:  High
   
   
       
CVE: CVE-2021-1432
Source: Cisco IOS XE SD-WAN Software Arbitrary Command Execution Vulnerability
Let's not argue. Let's network!