Cisco has addressed five vulnerabilities in its SD-WAN solution, including three high severity flaws.
The vulnerabilities could be exploited by attackers to make unauthorized changes to the system, inject arbitrary commands that are executed with root permissions, and escalate privileges to root.
The flaws are all caused by insufficient input validation, they were discovered by experts at Orange Group.
Three high-severity vulnerabilities, tracked as CVE-2020-3265, CVE-2020-3266, CVE-2020-3264, could be exploited by a local, authenticated attacker by sending specially crafted requests or specially crafted input to the targeted system.
The vulnerabilities impact several Cisco products running an SD-WAN version prior to 19.2.2. The list of affected products includes vBond Orchestrator, vEdge routers, vManage network management software, and vSmart controller software.
The tech giant also addressed a stored Cross-Site Scripting flaw (CVE-2019-16010) and a SQL Injection flaw (CVE-2019-16012) in the SD-WAN Solution vManage.
Both issues could be remotely exploited by an authenticated attacker.
The good news is that the company is not aware of attacks in the wild that exploited the above flaws.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – CISCO SD-WAN, cyber security)
[adrotate banner=”5″]
[adrotate banner=”13″]
The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…
China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…
The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…
BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…
An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…
Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…
This website uses cookies.