A vulnerability in the WebUI of the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system. The vulnerability is due to insufficient input validation of data parameters for certain fields in the affected solution. An attacker could exploit this vulnerability by configuring a malicious username on the login page of the affected solution. A successful exploit could allow the attacker to inject and execute arbitrary commands with vmanage user privileges on an affected system.
History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-01-26T04:25:13.915931Z

Updated: 2024-11-15T17:47:38.382Z

Reserved: 2019-06-04T00:00:00

Link: CVE-2019-12629

cve-icon Vulnrichment

Updated: 2024-08-04T23:24:39.229Z

cve-icon NVD

Status : Analyzed

Published: 2020-01-26T05:15:11.083

Modified: 2020-10-08T14:39:47.400

Link: CVE-2019-12629

cve-icon Redhat

No data.