Vulnerabilities in Cisco SD-WAN allow arbitrary code execution
Cisco has patched a number of critical vulnerabilities in its software-defined wide area network (SD-WAN) solutions.
A total of eight SD-WAN buffer overflow and command execution vulnerabilities were addressed. The most dangerous of these problems could be exploited by an unauthorized, remote attacker to execute arbitrary code on the affected system with superuser privileges.
One of the critical vulnerabilities (CVE-2021-1299) exists in the web-based management interface of the Cisco SD-WAN vManage software. The issue scored 9.9 out of 10 on the CVSS scale and could allow an authenticated, remote attacker to gain root-level access to the affected system and execute arbitrary commands as the superuser on the system.
Another critical buffer overflow vulnerability (CVE-2021-1300) scored 9.8 out of 10 on the CVSS scale and stems from incorrect handling of IP traffic.
Issues affect the following products with vulnerable release of the SD-WAN software: IOS XE SD-WAN Software, SD-WAN vBond Orchestrator Software, SD-WAN vEdge Cloud Routers, SD-WAN vEdge Routers, SD-WAN vManage Software, and SD-WAN vSmart Controller Software.
Three other critical vulnerabilities (CVE-2021-1138, CVE-2021-1140, and CVE-2021-1142) have been patched in the Cisco Smart Software Manager satellite and scored 9.8 out of 10 on the CVSS scale. They stem from the Cisco Smart Software Manager web user interface and could allow an unauthenticated, remote attacker to execute arbitrary commands as a high-privileged user on an affected device.
Issues affect Cisco Smart Software Manager Satellite 5.1.0 and earlier, and have been fixed in 6.3.0 and later releases.
Another issue was found in the Command Runner tool of Cisco DNA Center. The vulnerability (CVE-2021-1264) scored 9.6 out of 10 on the CVSS scale and affects all Cisco DNA Center software versions earlier than 1.3.1.0. The vulnerability was fixed in software versions 1.3.1.0 and later.
Source: securitylab.ru
22 January 2021