SB2021012108 - Multiple vulnerabilities in Cisco SD-WAN
Published: January 21, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Command Injection (CVE-ID: CVE-2021-1260)
The vulnerability allows a local user to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation in the CLI. A local user can pass specially crafted data to the application and execute arbitrary commands on the target system.
2) Command Injection (CVE-ID: CVE-2021-1261)
The vulnerability allows a local user to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation in the CLI utility tcpdump. A local user can pass specially crafted data to the application and execute arbitrary commands on the target system.
3) Command Injection (CVE-ID: CVE-2021-1262)
The vulnerability allows a local user to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation in the CLI. A local user can pass specially crafted data to the application and execute arbitrary commands on the target system.
4) Command Injection (CVE-ID: CVE-2021-1263)
The vulnerability allows a local user to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation in the CLI. A local user can pass specially crafted data to the application and execute arbitrary commands on the target system.
5) Command Injection (CVE-ID: CVE-2021-1298)
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation in the vAnalytics feature. A remote authenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system.
6) Command Injection (CVE-ID: CVE-2021-1299)
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation in the web-based management interface. A remote authenticated attacker can pass specially crafted data to the application and execute arbitrary commands on the target system.
Remediation
Install update from vendor's website.