CVE-2020-27129

A vulnerability in the remote management feature of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to inject arbitrary commands and potentially gain elevated privileges. The vulnerability is due to improper validation of commands to the remote management CLI of the affected application. An attacker could exploit this vulnerability by sending malicious requests to the affected application. A successful exploit could allow the attacker to inject arbitrary commands and potentially gain elevated privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:20

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-privilege-zPmMf73k - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-privilege-zPmMf73k - Vendor Advisory

Information

Published : 2020-11-06 19:15

Updated : 2024-11-21 05:20


NVD link : CVE-2020-27129

Mitre link : CVE-2020-27129

CVE.ORG link : CVE-2020-27129


JSON object : View

Products Affected

cisco

  • sd-wan_vmanage
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')