6.8
CVSSv2

CVE-2018-6961

Published: 11/06/2018 Updated: 03/10/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 686
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware nsx sd-wan by velocloud

Exploits

#!/usr/bin/env python # Exploit Title: Unauthenticated Command Injection vulnerability in VMware NSX SD-WAN by VeloCloud # Date: 2018-06-29 # Exploit Author: paragonsec @ Critical Start # Credit: Brian Sullivan from Tevora and Section 8 @ Critical Start # Vendor Homepage: wwwvmwarecom # Security Advisory: wwwvmwarecom/security ...
VMware NSX SD-WAN Edge versions prior to 312 suffer from a code execution vulnerability ...

Github Repositories

veloCloud VMWare - Vulnerability

CVE-2018-6961 - UNAUTHENTICATED COMMAND INJECTION VULNERABILITY This exploit works in Python27 - Not tested in any other version 1) Install Dependencies pip install request if don't have pip installed, just run apt-get install python-pip **2) Usage ** python exploytpy --rhost --interface --lh

VMware NSX SD-WAN command injection vulnerability

CVE-2018-6961 Exploit in Python3 VMware NSX SD-WAN Edge by VeloCloud prior to version 310 contains a command injection vulnerability in the local web UI component This component is disabled by default and should not be enabled on untrusted networks VeloCloud by VMware will be removing this service from the product in future releases Successful exploitation of this issue co