Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pv55-c55f-33qw

Опубликовано: 18 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 4.9

Описание

A vulnerability in the Image Signature Verification feature of Cisco SD-WAN Software could allow an authenticated, remote attacker with Administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.Cisco has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability.

A vulnerability in the Image Signature Verification feature of Cisco SD-WAN Software could allow an authenticated, remote attacker with Administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.Cisco has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability.

EPSS

Процентиль: 10%
0.00035
Низкий

4.9 Medium

CVSS3

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 4.9
nvd
около 1 года назад

A vulnerability in the Image Signature Verification feature of Cisco SD-WAN Software could allow an authenticated, remote attacker with Administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.Cisco has released software updates that address the vulnerability described in this advisory. There are no workarounds that address this vulnerability.

CVSS3: 4.9
fstec
почти 5 лет назад

Уязвимость функции проверки подписи образа микропрограммного обеспечения маршрутизаторов Cisco SD-WAN vEdge Routers, централизованной системой управления сетью Cisco SD-WAN vManage, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 10%
0.00035
Низкий

4.9 Medium

CVSS3

Дефекты

CWE-347