Vulnerability identifier: #VU17226
Vulnerability risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID:
CWE-ID:
CWE-120
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco SD-WAN
Client/Desktop applications /
Virtualization software
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote authenticated attacker to gain elevated privileges on an affected device.
The vulnerability exists due to improper bounds checking by the vContainer. A remote authenticated attacker can send a malicious file to an affected vContainer instance, trigger a buffer overflow condition on the affected vContainer and cause the service to crash or execute arbitrary code as the root user.
Successful exploitation of the vulnerability may result in system compromise.
Mitigation
Update to version 18.4.0.
Vulnerable software versions
Cisco SD-WAN: before 18.4.0
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-bo
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.