Vulnslist

find the latest Cisco vulnerabilities

Cisco SD-WAN Software Privilege Escalation Vulnerability

cisco-sa-vepeshlg-tJghOQcA · High · Published · Updated

A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient security controls on the CLI. An attacker could exploit this vulnerability by using an affected CLI utility that is running on an affected system. A successful exploit could allow the attacker to gain root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vepeshlg-tJghOQcA

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2020-3600
Cisco Bug IDsCSCvv42398
CVSS ScoreBase 7.8
Base 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Catalyst SD-WAN, Cisco Catalyst SD-WAN Manager, Cisco SD-WAN vEdge Router, Cisco SD-WAN vEdge Cloud, Cisco SD-WAN vContainer

Related Products

Product CVE Evidence
Cisco vEdge Routers CVE-2020-3600 Cisco OpenVuln
Cisco SD-WAN CVE-2020-3600 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2020-3600 Cisco OpenVuln
Cisco Catalyst SD-WAN Software CVE-2020-3600 Cisco OpenVuln
Cisco SD-WAN vEdge Router CVE-2020-3600 Cisco OpenVuln
Cisco SD-WAN vEdge Cloud CVE-2020-3600 Cisco OpenVuln
Cisco SD-WAN vContainer CVE-2020-3600 Cisco OpenVuln
Cisco Catalyst SD-WAN Manager CVE-2020-3600 Cisco OpenVuln
Cisco Catalyst SD-WAN CVE-2020-3600 Cisco OpenVuln