Command Injection Vulnerability in Cisco SD-WAN Solution's Tcpdump Utility
CVE-2018-0351
7.8HIGH
Summary
A command injection vulnerability exists in the tcpdump utility of the Cisco SD-WAN Solution due to inadequate input validation. An authenticated local attacker could exploit this flaw by submitting specially crafted input to the tcpdump, resulting in the execution of arbitrary commands with root privileges. This vulnerability affects various Cisco SD-WAN products prior to Release 18.3.0. Attackers must first authenticate to the device to leverage this vulnerability, allowing them to potentially compromise system integrity.
Affected Version(s)
Cisco SD-WAN Solution unknown Cisco SD-WAN Solution unknown
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved