A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-file-access-VW36d28P | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2022-04-15 08:15
Updated : 2022-05-13 10:50
NVD link : CVE-2022-20716
Mitre link : CVE-2022-20716
JSON object : View
CWE
Products Affected
cisco
- sd-wan
- sd-wan_vedge_cloud
- sd-wan_vsmart_controller_software
- sd-wan_vmanage
- sd-wan_vedge_router
- sd-wan_vbond_orchestrator
- sd-wan_solution