A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.
2019-01-24T15:29:00.767
2024-11-21T04:37:00.493
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | cisco | vedge_100_firmware | * | Yes |
Hardware | cisco | vedge_100 | - | No |
Operating System | cisco | vedge_1000_firmware | * | Yes |
Hardware | cisco | vedge_1000 | - | No |
Operating System | cisco | vedge_2000_firmware | * | Yes |
Hardware | cisco | vedge_2000 | - | No |
Operating System | cisco | vedge_5000_firmware | * | Yes |
Hardware | cisco | vedge_5000 | - | No |
Application | cisco | sd-wan | < 18.4.0 | Yes |
Application | cisco | vbond_orchestrator | - | Yes |
Application | cisco | vmanage_network_management | - | Yes |
Application | cisco | vsmart_controller | - | Yes |