Cisco Sd-Wan vulnerabilities

27 known vulnerabilities affecting cisco/sd-wan.

Total CVEs
27
CISA KEV
1
actively exploited
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH17MEDIUM7

Vulnerabilities

Page 2 of 2
CVE-2020-3180HIGHCVSS 7.8≥ 18.3.0, < 18.3.6≥ 18.4.0, < 18.4.5+1 more2020-07-16
CVE-2020-3180 [HIGH] CWE-264 CVE-2020-3180: A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to access an affected device by using an account that has a default, static password. This account has root privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this v
nvd
CVE-2019-1624HIGHCVSS 8.8fixed in 18.4.02019-06-20
CVE-2019-1624 [HIGH] CWE-77 CVE-2019-1624: A vulnerability in the vManage web-based UI (Web UI) in the Cisco SD-WAN Solution could allow an aut A vulnerability in the vManage web-based UI (Web UI) in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted
nvd
CVE-2019-1650HIGHCVSS 8.8fixed in 18.4.02019-01-24
CVE-2019-1650 [HIGH] CWE-20 CVE-2019-1650: A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwr A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the save command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the save
nvd
CVE-2019-1648HIGHCVSS 7.8fixed in 18.4.02019-01-24
CVE-2019-1648 [HIGH] CWE-264 CVE-2019-1648: A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenti A vulnerability in the user group configuration of the Cisco SD-WAN Solution could allow an authenticated, local attacker to gain elevated privileges on an affected device. The vulnerability is due to a failure to properly validate certain parameters included within the group configuration. An attacker could exploit this vulnerability by writing a craft
nvd
CVE-2019-1646HIGHCVSS 7.8fixed in 18.4.02019-01-24
CVE-2019-1646 [HIGH] CWE-264 CVE-2019-1646: A vulnerability in the local CLI of the Cisco SD-WAN Solution could allow an authenticated, local at A vulnerability in the local CLI of the Cisco SD-WAN Solution could allow an authenticated, local attacker to escalate privileges and modify device configuration files. The vulnerability exists because user input is not properly sanitized for certain commands at the CLI. An attacker could exploit this vulnerability by sending crafted commands to the CLI
nvd
CVE-2019-1647HIGHCVSS 8.0fixed in 18.4.02019-01-24
CVE-2019-1647 [HIGH] CWE-284 CVE-2019-1647: A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, adjacent attacker to bypa A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, adjacent attacker to bypass authentication and have direct unauthorized access to other vSmart containers. The vulnerability is due to an insecure default configuration of the affected system. An attacker could exploit this vulnerability by directly connecting to the exposed serv
nvd
CVE-2018-15387CRITICALCVSS 9.8≥ 17.2.0, < 17.2.8v18.3.02018-10-05
CVE-2018-15387 [CRITICAL] CWE-20 CVE-2018-15387: A vulnerability in the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypa A vulnerability in the Cisco SD-WAN Solution could allow an unauthenticated, remote attacker to bypass certificate validation on an affected device. The vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by supplying a system image signed with a crafted certificate to an affected device, bypassing
nvd