Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2022-03212

Опубликовано: 13 апр. 2022
Источник: fstec
CVSS3: 7.3
CVSS2: 6.6
EPSS Низкий

Описание

Уязвимость компонента CLI централизованной системой управления сетью Cisco SD-WAN vManage связана с небезопасным управлением привилегиями. Эксплуатация уязвимости может позволить нарушителю выполнить произвольные команды с помощью специально созданного файла

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco SD-WAN

Версия ПО

до 19.2.3 (Cisco SD-WAN)
от 20.4 до 20.4.1 (Cisco SD-WAN)
от 20.5 до 20.5.1 (Cisco SD-WAN)
от 20.1 до 20.1.2 (Cisco SD-WAN)
от 20.3 до 20.3.1 (Cisco SD-WAN)
от 20.6 до 20.6.1 (Cisco SD-WAN)
от 20.7 до 20.7.1 (Cisco SD-WAN)
от 18.3 до 18.4.6 (Cisco SD-WAN)

Тип ПО

Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,6)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,3)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-tEJFpBSL

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 31%
0.00116
Низкий

7.3 High

CVSS3

6.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.3
nvd
почти 4 года назад

A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected system as a low-privileged user to exploit this vulnerability. This vulnerability exists because a file leveraged by a root user is executed when a low-privileged user runs specific commands on an affected system. An attacker could exploit this vulnerability by injecting arbitrary commands to a specific file as a lower-privileged user and then waiting until an admin user executes specific commands. The commands would then be executed on the device by the root user. A successful exploit could allow the attacker to escalate their privileges on the affected system from a low-privileged user to the root user.

CVSS3: 7.3
github
почти 4 года назад

A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected system as a low-privileged user to exploit this vulnerability. This vulnerability exists because a file leveraged by a root user is executed when a low-privileged user runs specific commands on an affected system. An attacker could exploit this vulnerability by injecting arbitrary commands to a specific file as a lower-privileged user and then waiting until an admin user executes specific commands. The commands would then be executed on the device by the root user. A successful exploit could allow the attacker to escalate their privileges on the affected system from a low-privileged user to the root user.

EPSS

Процентиль: 31%
0.00116
Низкий

7.3 High

CVSS3

6.6 Medium

CVSS2