Cisco has addressed five vulnerabilities in its SD-WAN solution, including three high severity flaws.
The vulnerabilities could be exploited by attackers to make unauthorized changes to the system, inject arbitrary commands that are executed with root permissions, and escalate privileges to root.
The flaws are all caused by insufficient input validation, they were discovered by experts at Orange Group.
Three high-severity vulnerabilities, tracked as CVE-2020-3265, CVE-2020-3266, CVE-2020-3264, could be exploited by a local, authenticated attacker by sending specially crafted requests or specially crafted input to the targeted system.
The vulnerabilities impact several Cisco products running an SD-WAN version prior to 19.2.2. The list of affected products includes vBond Orchestrator, vEdge routers, vManage network management software, and vSmart controller software.
The tech giant also addressed a stored Cross-Site Scripting flaw (CVE-2019-16010) and a SQL Injection flaw (CVE-2019-16012) in the SD-WAN Solution vManage.
Both issues could be remotely exploited by an authenticated attacker.
The good news is that the company is not aware of attacks in the wild that exploited the above flaws.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – CISCO SD-WAN, cyber security)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.