Command Injection Vulnerability in Cisco SD-WAN Solution
CVE-2018-0348
7.2HIGH
Summary
A command injection vulnerability exists in the CLI of the Cisco SD-WAN Solution that allows an authenticated remote attacker to submit arbitrary commands for execution with root privileges. This vulnerability arises from inadequate input validation in the load command within the VPN subsystem. To exploit this vulnerability, the attacker must be authenticated and can execute malicious commands by interacting with the affected CLI parameters. This impacts various Cisco products running versions prior to Release 18.3.0, highlighting the critical need for prompt patching and security measures.
Affected Version(s)
Cisco SD-WAN Solution unknown Cisco SD-WAN Solution unknown
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved