Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on April 21, 2021, 12:09:06 PM

Title: Cisco Security Advisory - Cisco SD-WAN vManage Command Injection Vulnerability
Post by: Netwörkheäd on April 21, 2021, 12:09:06 PM
Cisco SD-WAN vManage Command Injection Vulnerability

A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to inject arbitrary commands on an affected system and cause a denial of service (DoS) condition.


This vulnerability is due to improper input validation of user-supplied input to the device template configuration. An attacker could exploit this vulnerability by submitting crafted input to the device template configuration. A successful exploit could allow the attacker to cause a DoS condition on the affected system.


Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.


This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX



     
         
Security Impact Rating:  Medium
   
   
       
CVE: CVE-2021-1484
Source: Cisco SD-WAN vManage Command Injection Vulnerability (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20SD-WAN%20vManage%20Command%20Injection%20Vulnerability&vs_k=1)