#VU17226 Buffer overflow in Cisco SD-WAN - CVE-2019-1651


Vulnerability identifier: #VU17226

Vulnerability risk: High

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2019-1651

CWE-ID: CWE-120

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco SD-WAN
Client/Desktop applications / Virtualization software

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote authenticated attacker to gain elevated privileges on an affected device.

The vulnerability exists due to improper bounds checking by the vContainer. A remote authenticated attacker can send a malicious file to an affected vContainer instance, trigger a buffer overflow condition on the affected vContainer and cause the service to crash or execute arbitrary code as the root user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation
Update to version 18.4.0.

Vulnerable software versions

Cisco SD-WAN: before 18.4.0


External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-bo


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability