PT-2022-6015 · Cisco · Cisco Sd-Wan Vedge Cloud Routers+5

Cyrille Chatras

·

Published

2022-09-28

·

Updated

2026-02-26

·

CVE-2022-20775

CVSS v3.1
7.8
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Cisco SD-WAN Software (affected versions not specified) Cisco SD-WAN vBond Orchestrator Cisco SD-WAN vEdge Cloud Routers Cisco SD-WAN vEdge Routers Cisco SD-WAN vSmart Controller Cisco SD-WAN vManage
Description A flaw exists in the Command Line Interface (CLI) of Cisco SD-WAN Software that could allow an authenticated, local attacker to obtain elevated privileges. This is a result of insufficient access controls on commands within the application's CLI. An attacker could exploit this by executing a malicious command through the CLI, potentially enabling them to execute arbitrary commands as the root user. The vulnerability involves incorrect restriction of the path name to an access-limited directory, which could allow an attacker to create or overwrite critical files as the root user.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Path traversal

Weakness Enumeration

Related Identifiers

BDU:2022-07466
CVE-2022-20775

Affected Products

Cisco Sd-Wan
Cisco Sd-Wan Vbond Orchestrator
Cisco Sd-Wan Vedge Cloud Routers
Cisco Sd-Wan Vedge Routers
Cisco Sd-Wan Vmanage
Cisco Sd-Wan Vsmart Controller