Tuesday, March 4, 2025
HomeCVE/vulnerability5 Bugs in Cisco SD-WAN Allows Attackers to Inject Arbitrary Commands With...

5 Bugs in Cisco SD-WAN Allows Attackers to Inject Arbitrary Commands With Root Privileges

Published on

SIEM as a Service

Follow Us on Google News

Cisco fixed 5 security flaws in Cisco SD-WAN that allow attackers to make unauthorized changes to the system, and to execute the arbitrary commands.

Out of five, three are high severity flaws and the flaws are due to insufficient input validation, now Cisco released a fix for all the flaws.

CVE-2020-3265 – Privilege Escalation

The vulnerability in Cisco SD-WAN Solution software is due to insufficient input validation, it allows a local attacker to escalate the privileges to root on the vulnerable machine.

It affects all the Cisco products running Cisco SD-WAN Solution software release earlier than Release 19.2.2.

CVE-2020-3266 – Command Injection Vulnerability

The vulnerability resides in CLI of Cisco SD-WAN Solution software. it allows a local attacker to inject arbitrary commands with root privileges.

It affects all the Cisco products running Cisco SD-WAN Solution software release earlier than Release 19.2.2.

CVE-2020-3264 – Buffer Overflow Vulnerability

The vulnerability resides in Cisco SD-WAN Solution software allow an authenticated local attacker to cause a buffer overflow on the vulnerable device.

It affects all the Cisco products running Cisco SD-WAN Solution software release earlier than Release 19.2.2.

CVE-2019-16010 – Cross-Site Scripting Vulnerability

The vulnerability resides in the web UI of the Cisco SD-WAN vManage software that allows an authenticated remote attacker to launch a cross-site scripting (XSS) attack.

It affects all the Cisco products running Cisco SD-WAN Solution software release earlier than Release 19.2.2.

CVE-2019-16012 – SQL Injection Vulnerability

The vulnerability resides in the web UI of Cisco SD-WAN Solution that allows an authenticated remote attacker to conduct SQL injection attacks on an affected system.

It affects all the Cisco products running Cisco SD-WAN Solution software release earlier than Release 19.2.2.

Read More:

Cisco Small Business Switches Vulnerabilities allows Attackers to Access Sensitive Information and Cause DoS

Cisco Webex Flaw Let Unauthenticated Remote Attackers to Join Private Meetings Without Password

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...