A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local malicious user to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful exploit could allow the malicious user to overwrite arbitrary system files, which could result in a denial of service (DoS) condition.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco sd-wan vbond orchestrator 20.8 |
||
cisco sd-wan vsmart controller 20.8 |
||
cisco sd-wan vsmart controller |
||
cisco sd-wan vmanage |
||
cisco sd-wan vbond orchestrator |
||
cisco sd-wan vbond orchestrator 20.9 |
||
cisco sd-wan vsmart controller 20.9 |
||
cisco catalyst sd-wan manager 20.9 |
||
cisco catalyst sd-wan manager 20.8 |
||
cisco sd-wan |
||
cisco sd-wan 20.8 |
||
cisco sd-wan 20.9 |