SB2020031910 - Multiple vulnerabilities in Cisco SD-WAN
Published: March 19, 2020 Updated: March 19, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) SQL injection (CVE-ID: CVE-2019-16012)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the web UI. A remote authenticated attacker can send a specially crafted request to the affected application and modify values on, or return values from, the underlying database as well as the operating system.
2) Stored cross-site scripting (CVE-ID: CVE-2019-16010)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the web UI. A remote administrator can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Buffer overflow (CVE-ID: CVE-2020-3264)
The vulnerability allows a local user to escalate privileges on the target system.
The vulnerability exists due to a boundary error. A local user can send a specially crafted traffic, trigger memory corruption and gain access to information that they are not authorized to access and make changes to the system that they are not authorized to make.
This vulnerability affects the following Cisco products if they are running a vulnerable versions of Cisco SD-WAN Solution software.
- vBond Orchestrator Software
- vEdge 100 Series Routers
- vEdge 1000 Series Routers
- vEdge 2000 Series Routers
- vEdge 5000 Series Routers
- vEdge Cloud Router Platform
- vManage Network Management System
- vSmart Controller Software
4) Command Injection (CVE-ID: CVE-2020-3266)
The vulnerability allows a local user to execute arbitrary commands on the target system.
The vulnerability exists due to insufficient input validation. A local user can submit a specially crafted input to the CLI utility and execute arbitrary commands with root privileges.
This vulnerability affects the following Cisco products if they are
running a vulnerable versions of Cisco SD-WAN Solution software.
- vBond Orchestrator Software
- vEdge 100 Series Routers
- vEdge 1000 Series Routers
- vEdge 2000 Series Routers
- vEdge 5000 Series Routers
- vEdge Cloud Router Platform
- vManage Network Management System
- vSmart Controller Software
5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-3265)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient input validation. A local user can send a specially crafted request and gain root-level privileges on the target system.
This vulnerability affects the following Cisco products if they are
running a vulnerable versions of Cisco SD-WAN Solution software.
Remediation
Install update from vendor's website.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200318-vmanage-cypher-inject
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200318-vmanage-xss
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanbo-QKcABnS2
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwpresc-ySJGvE9