Description
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful exploit could allow the attacker to overwrite arbitrary system files, which could result in a denial of service (DoS) condition.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-26180 | A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful exploit could allow the attacker to overwrite arbitrary system files, which could result in a denial of service (DoS) condition. |
References
History
Fri, 01 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Cisco
Subscribe
Catalyst Sd-wan Manager
Subscribe
Sd-wan
Subscribe
Sd-wan Vbond Orchestrator
Subscribe
Sd-wan Vmanage
Subscribe
Sd-wan Vsmart Controller
Subscribe
Vedge 100
Subscribe
Vedge 1000
Subscribe
Vedge 100b
Subscribe
Vedge 100m
Subscribe
Vedge 100wm
Subscribe
Vedge 2000
Subscribe
Vedge 5000
Subscribe
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-01T18:50:04.587Z
Reserved: 2021-11-02T00:00:00.000Z
Link: CVE-2022-20930
Updated: 2024-08-03T02:31:57.960Z
Status : Modified
Published: 2022-09-30T19:15:13.557
Modified: 2024-11-21T06:43:50.820
Link: CVE-2022-20930
No data.
OpenCVE Enrichment
No data.
EUVD