A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges.
The vulnerability is due to insufficient input validation by the system CLI. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-rhpbE34A”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | cisco_ios_xe_software | 17.2 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.2:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.2.1r | cpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1r:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.2.1v | cpe:2.3:a:cisco:cisco_ios_xe_software:17.2.1v:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.2.2 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.2.2:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.3 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.3:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.3.1 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.3.1:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.3.2 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.3.2:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.3.3 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.3.3:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.3.1a | cpe:2.3:a:cisco:cisco_ios_xe_software:17.3.1a:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.3.1w | cpe:2.3:a:cisco:cisco_ios_xe_software:17.3.1w:*:*:*:*:*:*:* |