{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2021-018.pdf"
    },
    "title": "Critical Vulnerabilities in Cisco SD WAN vManage Software",
    "serial_number": "2021-018",
    "publish_date": "08-04-2021 08:02:00",
    "description": "Cisco has published an advisory about several vulnerabilities affecting Cisco SD-WAN software. These vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. While Cisco is not aware of any malicious exploit in the wild, it is highly recommended to patch the affected products.",
    "url_title": "2021-018",
    "content_markdown": "---\ntitle: 'Critical Vulnerabilities in\u00a0Cisco\u00a0SD\u00a0WAN vManage Software'\nversion: '1.0'\nnumber: '2021-018'\ndate: 'April 8, 2021'\n---\n\n_History:_\n\n* _8/04/2021 --- v1.0 -- Initial publication_\n\n# Summary\n\nCisco has published an advisory about several vulnerabilities affecting Cisco SD-WAN software [1-4]. These vulnerabilities could allow an unauthenticated, remote attacker to **execute arbitrary code** or allow an authenticated, local attacker to **gain escalated privileges** on an affected system. While Cisco is not aware of any malicious exploit in the wild, it is highly recommended to patch the affected products.\n\n# Technical Details\n\nThis advisory only describes the most critical vulnerabilities disclosed by Cisco for enterprise products.\n\n## CVE-2021-1479\n\nThe first vulnerability is due to improper validation of user-supplied input to the vulnerable component. An attacker could exploit this vulnerability by sending a crafted connection request to the vulnerable component that, when processed, could cause a buffer overflow condition. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system with _root_ privileges.\n\n## CVE-2021-1137\n\nThe second vulnerability, is due to insufficient input validation by the affected software. An authenticated attacker who has permissions to add new users or groups on the vManage system could exploit this vulnerability by modifying a user account. A successful exploit could allow the attacker to gain _root_ privileges on the underlying operating system.  \n\n## CVE-2021-1480\n\nThe third vulnerability, is due to improper validation of input to the system file transfer functions. An authenticated attacker could exploit this vulnerability by sending specially crafted requests to the vulnerable system. A successful exploit could allow the attacker to overwrite arbitrary files and modify the system in such a way that could allow the attacker to gain _root_ privileges on the underlying operating system.\n\n# Affected Products\n\nThe following products could be affected by the vulnerabilities:\n\n* IOS XE SD-WAN Software\n* SD-WAN cEdge Routers\n* SD-WAN vBond Orchestrator Software\n* SD-WAN vEdge Routers\n* SD-WAN vSmart Controller Software\n\nThe following software releases are affected by the vulnerabilities:\n\n\n|Cisco SD-WAN vManage Release |\tFirst Fixed Release |\n|-|-|-|\n|18.4 and earlier |\tMigrate to a fixed branch (19.2) |\n|19.2| \t19.2.4|\n|19.3| \tMigrate to a fixed branch (20.3 or later) |\n|20.1| \tMigrate to a fixed branch (20.3 or later) |\n|20.3| \t20.3.3|\n|20.4| \t20.4.1|\n\n# Recommendations\n\nIt is recommended to apply the patches from Cisco for all affected software and products.\n\n# References\n\n[1] <https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy>\n\n[2] <https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-1137>\n\n[3] <https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-1479>\n\n[4] <https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-1480>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>8/04/2021 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>Cisco has published an advisory about several vulnerabilities affecting Cisco SD-WAN software [1-4]. These vulnerabilities could allow an unauthenticated, remote attacker to <strong>execute arbitrary code</strong> or allow an authenticated, local attacker to <strong>gain escalated privileges</strong> on an affected system. While Cisco is not aware of any malicious exploit in the wild, it is highly recommended to patch the affected products.</p><h2 id=\"technical-details\">Technical Details</h2><p>This advisory only describes the most critical vulnerabilities disclosed by Cisco for enterprise products.</p><h3 id=\"cve-2021-1479\">CVE-2021-1479</h3><p>The first vulnerability is due to improper validation of user-supplied input to the vulnerable component. An attacker could exploit this vulnerability by sending a crafted connection request to the vulnerable component that, when processed, could cause a buffer overflow condition. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system with <em>root</em> privileges.</p><h3 id=\"cve-2021-1137\">CVE-2021-1137</h3><p>The second vulnerability, is due to insufficient input validation by the affected software. An authenticated attacker who has permissions to add new users or groups on the vManage system could exploit this vulnerability by modifying a user account. A successful exploit could allow the attacker to gain <em>root</em> privileges on the underlying operating system. </p><h3 id=\"cve-2021-1480\">CVE-2021-1480</h3><p>The third vulnerability, is due to improper validation of input to the system file transfer functions. An authenticated attacker could exploit this vulnerability by sending specially crafted requests to the vulnerable system. A successful exploit could allow the attacker to overwrite arbitrary files and modify the system in such a way that could allow the attacker to gain <em>root</em> privileges on the underlying operating system.</p><h2 id=\"affected-products\">Affected Products</h2><p>The following products could be affected by the vulnerabilities:</p><ul><li>IOS XE SD-WAN Software</li><li>SD-WAN cEdge Routers</li><li>SD-WAN vBond Orchestrator Software</li><li>SD-WAN vEdge Routers</li><li>SD-WAN vSmart Controller Software</li></ul><p>The following software releases are affected by the vulnerabilities:</p><table><thead><tr><th>Cisco SD-WAN vManage Release</th><th>First Fixed Release</th></tr></thead><tbody><tr><td>18.4 and earlier</td><td>Migrate to a fixed branch (19.2)</td></tr><tr><td>19.2</td><td>19.2.4</td></tr><tr><td>19.3</td><td>Migrate to a fixed branch (20.3 or later)</td></tr><tr><td>20.1</td><td>Migrate to a fixed branch (20.3 or later)</td></tr><tr><td>20.3</td><td>20.3.3</td></tr><tr><td>20.4</td><td>20.4.1</td></tr></tbody></table><h2 id=\"recommendations\">Recommendations</h2><p>It is recommended to apply the patches from Cisco for all affected software and products.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy\">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-YuTVWqy</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-1137\">https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-1137</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-1479\">https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-1479</a></p><p>[4] <a rel=\"noopener\" target=\"_blank\" href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-1480\">https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-1480</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}