Lucene search

K
ciscoCiscoCISCO-SA-SDWAN-VMANAGE-WFNQMYHN
HistoryApr 19, 2023 - 4:00 p.m.

Cisco SD-WAN vManage Software Arbitrary File Deletion Vulnerability

2023-04-1916:00:00
tools.cisco.com
16
cisco
sd-wan
vmanage
software
file deletion
vulnerability
cli
local attacker
system commands
administrative privileges
directory traversal
software updates
security advisory

EPSS

0

Percentile

9.9%

A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files.

This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vmanage-wfnqmYhN”]

Affected configurations

Vulners
Node
ciscocatalyst_sd-wan_managerMatchany
OR
ciscocatalyst_sd-wan_managerMatchany
VendorProductVersionCPE
ciscocatalyst_sd-wan_manageranycpe:2.3:a:cisco:catalyst_sd-wan_manager:any:*:*:*:*:*:*:*

EPSS

0

Percentile

9.9%

Related for CISCO-SA-SDWAN-VMANAGE-WFNQMYHN