A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a crafted file to the directory where the user group configuration is located in the underlying operating system. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106719 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-sol-escal | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2019-01-24 15:29
Updated : 2024-02-28 16:48
NVD link : CVE-2019-1648
Mitre link : CVE-2019-1648
CVE.ORG link : CVE-2019-1648
JSON object : View
Products Affected
cisco
- vedge_1000
- vsmart_controller
- vedge_2000_firmware
- vmanage_network_management
- vbond_orchestrator
- vedge_5000
- vedge_2000
- vedge_5000_firmware
- sd-wan
- vedge_100
- vedge_1000_firmware
- vedge_100_firmware