- Description
- A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
- ykramarz@cisco.com
- CWE-284
- nvd@nist.gov
- NVD-CWE-Other
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AE3D96F7-3574-443F-9AD4-5E62E0F5E4F5"
},
{
"criteria": "cpe:2.3:a:cisco:sd-wan_solution:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "264691E8-B9EE-445B-AA73-339E2AD9D75A"
},
{
"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "05AFD69C-BB2C-43E0-89CF-FDA00B8F4CB5"
},
{
"criteria": "cpe:2.3:a:cisco:sd-wan_vedge_cloud:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F79EFC51-42F0-4E00-9993-2CBD852BB7EE"
},
{
"criteria": "cpe:2.3:a:cisco:sd-wan_vedge_router:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E751F057-CC4E-49AF-BFFE-1C08A0AFEDBC"
},
{
"criteria": "cpe:2.3:a:cisco:sd-wan_vsmart_controller_software:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5C1E3D19-7A59-41DA-A216-814E6AB697B5"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "633B8D51-C333-4C34-BE6B-4A95BA0A0E20",
"versionEndExcluding": "20.6.1",
"versionStartIncluding": "18.4"
},
{
"criteria": "cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "71DFA673-7836-4EC9-9B73-428598BC012D",
"versionEndExcluding": "20.7.1",
"versionStartIncluding": "20.7"
}
],
"operator": "OR"
}
]
}
]