Cisco Patches Critical Flaw in SD-WAN vManage

Cisco this week announced patches for tens of vulnerabilities across its product portfolio, including a critical severity issue impacting the SD-WAN vManage software.


Tracked as CVE-2021-1479 with a CVSS score of 9.8, the critical bug exists because of improper validation of user-supplied input and could allow an attacker to trigger a buffer overflow by sending a crafted connection request to the remote management component of SD-WAN vManage.

An attacker able to successfully exploit the security issue would “execute arbitrary code on the underlying operating system with root privileges,” Cisco explains.

The flaw was addressed alongside two high severity elevation of privilege vulnerabilities in SD-WAN vManage, each featuring a CVSS score of 7.8.

Exploitable by authenticated attackers, the bugs could allow for the escalation of privileges to root.

In an advisory, Cisco notes that affected products include IOS XE SD-WAN software, SD-WAN cEdge routers, SD-WAN vBond Orchestrator software, SD-WAN vEdge routers, and SD-WAN vSmart Controller software.

The company has released software updates to address these flaws and says that there are no workarounds available. Cisco also notes that it is not aware of the flaws being exploited in the wild.

Separately, Cisco announced that it would not release patches for a critical


vulnerability in the web-based management interface of RV110W, RV130, RV130W, and RV215W small business routers, which reached end-of-life.

Tracked as CVE-2021-1459 and triggered through crafted HTTP requests, the vulnerability could be exploited to execute arbitrary code with root privileges. The vulnerability affects RV110W Wireless-N VPN firewall, RV13 ..

Support the originator by clicking the read the rest link below.