Cisco Security Advisory - Cisco SD-WAN vManage Software Privilege Escalation Vulnerability

Started by Netwörkheäd, April 17, 2022, 06:22:33 AM

Previous topic - Next topic

Netwörkheäd

Cisco SD-WAN vManage Software Privilege Escalation Vulnerability

<p>A vulnerability in the CLI of Cisco&nbsp;SD-WAN vManage Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the <em>root</em> user. The attacker must be authenticated on the affected system as a low-privileged user to exploit this vulnerability.</p>
<p>This vulnerability exists because a file leveraged by a <em>root</em> user is executed when a low-privileged user runs specific commands on an affected system. An attacker could exploit this vulnerability by injecting arbitrary commands to a specific file as a lower-privileged user and then waiting until an admin user executes specific commands. The commands would then be executed on the device by the <em>root</em> user. A successful exploit could allow the attacker to escalate their privileges on the affected system from a low-privileged user to the <em>root</em> user.</p>
<p>Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-tEJFpBSL" target="_blank" rel="noopener">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-tEJFpBSL</a></p>

     
         
Security Impact Rating:  High
   
   
       
CVE: CVE-2022-20739
Source: Cisco SD-WAN vManage Software Privilege Escalation Vulnerability
Let's not argue. Let's network!