Buffer Overflow Vulnerability in Cisco SD-WAN Solution
CVE-2018-0342
6.7MEDIUM
Summary
A flaw in the configuration and monitoring service of the Cisco SD-WAN Solution allows an authenticated local attacker to execute arbitrary code with root privileges or create a denial of service condition. This vulnerability arises from incomplete bounds checks for input data provided to the configuration service. By sending crafted malicious input to the vulnerable vDaemon service, an attacker could trigger a buffer overflow. Successful exploitation allows the attacker to run arbitrary code with elevated privileges or to cause the vDaemon service to crash, leading to a temporary unavailability of the affected devices.
Affected Version(s)
Cisco SD-WAN Solution unknown Cisco SD-WAN Solution unknown
References
CVSS V3.1
Score:
6.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved