A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with Administrator privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as a low-privileged user to execute the affected commands. A successful exploit could allow the attacker to execute commands with Administrator privileges.

Project Subscriptions

Vendors Products
Catalyst Sd-wan Manager Subscribe
Sd-wan Vbond Orchestrator Subscribe
Sd-wan Vmanage Subscribe
Vedge-100b Subscribe
Vedge-100b Firmware Subscribe
Vedge 100 Subscribe
Vedge 1000 Subscribe
Vedge 1000 Firmware Subscribe
Vedge 100 Firmware Subscribe
Vedge 100b Subscribe
Vedge 100b Firmware Subscribe
Vedge 100m Subscribe
Vedge 100m Firmware Subscribe
Vedge 100wm Subscribe
Vedge 100wm Firmware Subscribe
Vedge 2000 Subscribe
Vedge 2000 Firmware Subscribe
Vedge 5000 Subscribe
Vedge 5000 Firmware Subscribe
Vedge Cloud Subscribe
Vedge Cloud Firmware Subscribe
Vsmart Controller Subscribe
Vsmart Controller Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-6981 A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with Administrator privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as a low-privileged user to execute the affected commands. A successful exploit could allow the attacker to execute commands with Administrator privileges.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 09 Nov 2024 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-08T23:16:58.110Z

Reserved: 2020-11-13T00:00:00

Link: CVE-2021-1514

cve-icon Vulnrichment

Updated: 2024-08-03T16:11:17.749Z

cve-icon NVD

Status : Modified

Published: 2021-05-06T13:15:10.887

Modified: 2024-11-21T05:44:31.353

Link: CVE-2021-1514

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses