A vulnerability in the error reporting feature of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the error reporting application configuration. An attacker could exploit this vulnerability by sending a crafted command to the error reporting feature. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation | Vendor Advisory |
http://www.securityfocus.com/bid/105296 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
Information
Published : 2018-10-05 07:29
Updated : 2019-10-09 16:32
NVD link : CVE-2018-0432
Mitre link : CVE-2018-0432
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
cisco
- vedge_5000_firmware
- vedge_100
- vedge_1000
- vedge_1000_firmware
- vedge_2000
- vedge_5000
- vedge_100_firmware
- vedge_2000_firmware
- vmanage_network_management_system