Cisco SD-WAN vManage Software Privilege Escalation Vulnerability
<p>A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the <em>root</em> user. The attacker must be authenticated on the affected system as a low-privileged user to exploit this vulnerability.</p>
<p>This vulnerability exists because a file leveraged by a <em>root</em> user is executed when a low-privileged user runs specific commands on an affected system. An attacker could exploit this vulnerability by injecting arbitrary commands to a specific file as a lower-privileged user and then waiting until an admin user executes specific commands. The commands would then be executed on the device by the <em>root</em> user. A successful exploit could allow the attacker to escalate their privileges on the affected system from a low-privileged user to the <em>root</em> user.</p>
<p>Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</p>
<p>This advisory is available at the following link:<br><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-tEJFpBSL" target="_blank" rel="noopener">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-tEJFpBSL</a></p>
Security Impact Rating: High
CVE: CVE-2022-20739
Source: Cisco SD-WAN vManage Software Privilege Escalation Vulnerability (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-tEJFpBSL?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20SD-WAN%20vManage%20Software%20Privilege%20Escalation%20Vulnerability&vs_k=1)