VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.
References
Link | Resource |
---|---|
http://www.vmware.com/security/advisories/VMSA-2018-0011.html | Vendor Advisory |
http://www.securityfocus.com/bid/104185 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041210 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44959/ | Exploit VDB Entry Third Party Advisory |
Configurations
Information
Published : 2018-06-11 15:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-6961
Mitre link : CVE-2018-6961
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
vmware
- nsx_sd-wan_by_velocloud