// For flags

CVE-2018-6961

VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability

Severity Score

8.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.

VMware NSX SD-WAN Edge by VeloCloud en versiones anteriores a la 3.1.0 contiene una vulnerabilidad de inyección de comandos en el componente local web UI. Este componente está deshabilitado por defecto y no se debería habilitar en redes no fiables. VeloCloud by VMware eliminará este servicio del producto en futuras versiones. Una explotación exitosa de esta vulnerabilidad podría resultar en una ejecución remota de código.

VMware NSX SD-WAN Edge versions prior to 3.1.2 suffer from a code execution vulnerability.

VMware SD-WAN Edge by VeloCloud contains a command injection vulnerability in the local web UI component. Successful exploitation of this issue could result in remote code execution.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-02-14 CVE Reserved
  • 2018-06-11 CVE Published
  • 2019-01-28 First Exploit
  • 2022-03-25 Exploited in Wild
  • 2022-04-15 KEV Due Date
  • 2024-06-26 EPSS Updated
  • 2024-09-17 CVE Updated
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vmware
Search vendor "Vmware"
Nsx Sd-wan By Velocloud
Search vendor "Vmware" for product "Nsx Sd-wan By Velocloud"
< 3.1.0
Search vendor "Vmware" for product "Nsx Sd-wan By Velocloud" and version " < 3.1.0"
-
Affected