You are here
Home > Preporuke > Ranjivost Cisco SD-WAN Solution poizvoda

Ranjivost Cisco SD-WAN Solution poizvoda

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco SD-WAN Solution Privilege Escalation Vulnerability

Advisory ID: cisco-sa-20180905-sd-wan-escalation

Revision: 1.0

For Public Release: 2018 September 5 16:00 GMT

Last Updated: 2018 September 5 16:00 GMT

CVE ID(s): CVE-2018-0432

CVSS Score v(3): 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the error reporting feature of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to gain elevated privileges on an affected device.

The vulnerability is due to a failure to properly validate certain parameters included within the error reporting application configuration. An attacker could exploit this vulnerability by sending a crafted command to the error reporting feature. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation”]

—–BEGIN PGP SIGNATURE—–
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=SQyM
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Ranjivost Cisco Umbrella Enterprise Roaming Client proizvoda

Otkrivena je ranjivost kod Cisco Umbrella Enterprise Roaming Client proizvoda uzrokovana neispravnom implementacijom dozvola datotečnog sustava što omogućuje neadministratorskim korisnicima...

Close