Buffer Overflow Vulnerability in Cisco SD-WAN Solution
CVE-2018-0342

6.7MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
18 July 2018

Summary

A flaw in the configuration and monitoring service of the Cisco SD-WAN Solution allows an authenticated local attacker to execute arbitrary code with root privileges or create a denial of service condition. This vulnerability arises from incomplete bounds checks for input data provided to the configuration service. By sending crafted malicious input to the vulnerable vDaemon service, an attacker could trigger a buffer overflow. Successful exploitation allows the attacker to run arbitrary code with elevated privileges or to cause the vDaemon service to crash, leading to a temporary unavailability of the affected devices.

Affected Version(s)

Cisco SD-WAN Solution unknown Cisco SD-WAN Solution unknown

References

CVSS V3.1

Score:
6.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.