Vulnslist

find the latest Cisco vulnerabilities

Cisco SD-WAN Solution Improper Access Control Vulnerability

cisco-sa-sd-wan-file-access-VW36d28P · High · Published · Updated

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges.  This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-file-access-VW36d28P

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2022-20716
Cisco Bug IDsCSCvy11382
CVSS ScoreBase 7.8
Base 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Catalyst SD-WAN, Cisco Catalyst SD-WAN Manager, Cisco SD-WAN vEdge Router, Cisco SD-WAN vEdge Cloud

Related Products

Product CVE Evidence
Cisco SD-WAN vEdge Router CVE-2022-20716 Cisco OpenVuln
Cisco SD-WAN vEdge Cloud CVE-2022-20716 Cisco OpenVuln
Cisco SD-WAN Solution CVE-2022-20716 Cisco OpenVuln
Cisco Catalyst SD-WAN Manager CVE-2022-20716 Cisco OpenVuln
Cisco Catalyst SD-WAN CVE-2022-20716 Cisco OpenVuln