CVE-2018-6961

VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.
References
Link Resource
http://www.securityfocus.com/bid/104185 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041210 Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2018-0011.html Vendor Advisory
https://www.exploit-db.com/exploits/44959/ Exploit VDB Entry Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:vmware:nsx_sd-wan_by_velocloud:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-06-11 22:29

Updated : 2024-02-28 16:25


NVD link : CVE-2018-6961

Mitre link : CVE-2018-6961

CVE.ORG link : CVE-2018-6961


JSON object : View

Products Affected

vmware

  • nsx_sd-wan_by_velocloud
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')