// For flags

CVE-2019-1650

Cisco SD-WAN Solution Arbitrary File Overwrite Vulnerability

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected device. The vulnerability is due to improper input validation of the save command in the CLI of the affected software. An attacker could exploit this vulnerability by modifying the save command in the CLI of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying operating system of an affected device and escalate their privileges to the root user.

Una vulnerabilidad en la solución Cisco SD-WAN podría permitir a un atacante remoto autenticado sobrescribir archivos arbitrarios en el sistema operativo subyacente de un dispositivo afectado. La vulnerabilidad se debe a una validación de entrada incorrecta del comando save en la interfaz de línea de comandos (CLI) del software afectado. Un atacante podría explotar esta vulnerabilidad modificando el comando save en la CLI de un dispositivo afectado. Si se explota esta vulnerabilidad con éxito, el atacante podría sobrescribir archivos arbitrarios en el sistema operativo subyacente de un dispositivo afectado y escalar sus privilegios a usuario root.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-01-24 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Vedge 100 Firmware
Search vendor "Cisco" for product "Vedge 100 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 100
Search vendor "Cisco" for product "Vedge 100"
--
Safe
Cisco
Search vendor "Cisco"
Vedge 1000 Firmware
Search vendor "Cisco" for product "Vedge 1000 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 1000
Search vendor "Cisco" for product "Vedge 1000"
--
Safe
Cisco
Search vendor "Cisco"
Vedge 2000 Firmware
Search vendor "Cisco" for product "Vedge 2000 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 2000
Search vendor "Cisco" for product "Vedge 2000"
--
Safe
Cisco
Search vendor "Cisco"
Vedge 5000 Firmware
Search vendor "Cisco" for product "Vedge 5000 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Vedge 5000
Search vendor "Cisco" for product "Vedge 5000"
--
Safe
Cisco
Search vendor "Cisco"
Sd-wan
Search vendor "Cisco" for product "Sd-wan"
< 18.4.0
Search vendor "Cisco" for product "Sd-wan" and version " < 18.4.0"
-
Affected
Cisco
Search vendor "Cisco"
Vbond Orchestrator
Search vendor "Cisco" for product "Vbond Orchestrator"
--
Affected
Cisco
Search vendor "Cisco"
Vmanage Network Management
Search vendor "Cisco" for product "Vmanage Network Management"
--
Affected
Cisco
Search vendor "Cisco"
Vsmart Controller
Search vendor "Cisco" for product "Vsmart Controller"
--
Affected