Lucene search

K
ciscoCiscoCISCO-SA-VSOLN-ARBFILE-GTSEYXNS
HistoryNov 04, 2020 - 4:00 p.m.

Cisco SD-WAN Software Arbitrary File Creation Vulnerability

2020-11-0416:00:00
tools.cisco.com
19
vulnerability
cisco sd-wan
arbitrary file
authentication
local attacker
denial of service
input validation
crafted arguments
software update
dos condition.

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to create or overwrite arbitrary files on an affected device, which could result in a denial of service (DoS) condition.

The vulnerability is due to insufficient input validation for specific commands. An attacker could exploit this vulnerability by including crafted arguments to those specific commands. A successful exploit could allow the attacker to create or overwrite arbitrary files on the affected device, which could result in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns”]

Affected configurations

Vulners
Node
ciscosd-wan_vmanageMatchany
OR
ciscosd-wan_vedge_routerMatchany
OR
ciscosd-wan_vedge_cloudMatchany
OR
ciscosd-wanMatchany
OR
ciscosd-wan_vmanageMatchany
OR
ciscosd-wan_vedge_routerMatchany
OR
ciscosd-wan_vedge_cloudMatchany
OR
ciscosd-wanMatchany
VendorProductVersionCPE
ciscosd-wan_vmanageanycpe:2.3:a:cisco:sd-wan_vmanage:any:*:*:*:*:*:*:*
ciscosd-wan_vedge_routeranycpe:2.3:a:cisco:sd-wan_vedge_router:any:*:*:*:*:*:*:*
ciscosd-wan_vedge_cloudanycpe:2.3:a:cisco:sd-wan_vedge_cloud:any:*:*:*:*:*:*:*
ciscosd-wananycpe:2.3:a:cisco:sd-wan:any:*:*:*:*:*:*:*
Related for CISCO-SA-VSOLN-ARBFILE-GTSEYXNS