Vulnerability identifier: #VU17222
Vulnerability risk: Low
CVSSv4.0: 6.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Cisco SD-WAN
Client/Desktop applications /
Virtualization software
Vendor: Cisco Systems, Inc
Description
The vulnerability allows an adjacent authenticated attacker to bypass security restrictions on the target system.
The vulnerability exists due to an insecure default configuration. An adjacent authenticated attacker can directly connect to the exposed services to retrieve and modify critical system files.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Cisco SD-WAN: 18.3.0
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-unacce...
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.