Multiple vulnerabilities in Cisco SD-WAN products could allow an authenticated attacker to perform command injection attacks against an affected device, which could allow the attacker to take certain actions with root privileges on the device. For more information about these vulnerabilities, see the Details section of this advisory.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
06 Oct 2023, 16:24
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco catalyst Sd-wan Manager
|
|
CPE | cpe:2.3:a:cisco:catalyst_sd-wan_manager:-:*:*:*:*:*:*:* |
29 Sep 2023, 15:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco sd-wan Manager
|
|
CPE | cpe:2.3:a:cisco:sd-wan_manager:-:*:*:*:*:*:*:* |
Information
Published : 2021-01-20 20:15
Updated : 2024-02-28 18:08
NVD link : CVE-2021-1263
Mitre link : CVE-2021-1263
CVE.ORG link : CVE-2021-1263
JSON object : View
Products Affected
cisco
- vedge_2000_router
- vedge_100wm_router
- vedge_100_router
- sd-wan_vsmart_controller_firmware
- sd-wan_firmware
- vedge_100m_router
- vedge_cloud_router
- sd-wan_vbond_orchestrator
- vedge_1000_router
- catalyst_sd-wan_manager
- vedge_5000_router
- vedge_100b_router